Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/79189?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "type": "ebuild", "namespace": "mail-client", "name": "thunderbird-bin", "version": "115.7.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "115.10.0", "latest_non_vulnerable_version": "128.9.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51404?format=api", "vulnerability_id": "VCID-19r2-4svk-uydr", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4578", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.2901", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29238", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29121", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35742", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35882", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35793", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35815", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35823", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35783", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.3576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.358", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35789", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35912", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4578" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236077", "reference_id": "2236077", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236077" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839007", "reference_id": "show_bug.cgi?id=1839007", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839007" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4578" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-19r2-4svk-uydr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51411?format=api", "vulnerability_id": "VCID-1dkk-86db-s3ch", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5168", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49006", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.4902", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48984", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49019", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.48965", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49052", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49056", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49005", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00256", "scoring_system": "epss", "scoring_elements": "0.49015", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5168" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240892", "reference_id": "2240892", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240892" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-42/", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-43/", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-43/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846683", "reference_id": "show_bug.cgi?id=1846683", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846683" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5168" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1dkk-86db-s3ch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51384?format=api", "vulnerability_id": "VCID-1h5k-e7nm-uyc9", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3417.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3417.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3417", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36949", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37076", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.3701", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37001", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.3711", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36937", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43367", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43497", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43432", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0021", "scoring_system": "epss", "scoring_elements": "0.43363", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3417" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225325", "reference_id": "2225325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2225325" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5463", "reference_id": "dsa-5463", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5463" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-27", "reference_id": "mfsa2023-27", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-27" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-27/", "reference_id": "mfsa2023-27", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-27/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-28", "reference_id": "mfsa2023-28", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-28" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-28/", "reference_id": "mfsa2023-28", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-28/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00032.html", "reference_id": "msg00032.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00032.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1835582", "reference_id": "show_bug.cgi?id=1835582", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1835582" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-3417" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1h5k-e7nm-uyc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51396?format=api", "vulnerability_id": "VCID-32pc-j3he-pffx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57354", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57331", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57397", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57375", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57348", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57371", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57416", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57401", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57399", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57347", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57395", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228367", "reference_id": "2228367", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228367" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1782561", "reference_id": "show_bug.cgi?id=1782561", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1782561" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4055" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-32pc-j3he-pffx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51421?format=api", "vulnerability_id": "VCID-4f4y-p7h8-dygq", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5728.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5728.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5728", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57622", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00352", "scoring_system": "epss", "scoring_elements": "0.57581", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66937", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67037", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66936", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66962", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67021", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67006", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.66973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00525", "scoring_system": "epss", "scoring_elements": "0.67004", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245903", "reference_id": "2245903", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245903" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5535", "reference_id": "dsa-5535", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5535" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5538", "reference_id": "dsa-5538", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5538" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html", "reference_id": "msg00037.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6162", "reference_id": "RHSA-2023:6162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6185", "reference_id": "RHSA-2023:6185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6186", "reference_id": "RHSA-2023:6186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6187", "reference_id": "RHSA-2023:6187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6188", "reference_id": "RHSA-2023:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6189", "reference_id": "RHSA-2023:6189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6191", "reference_id": "RHSA-2023:6191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6194", "reference_id": "RHSA-2023:6194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6195", "reference_id": "RHSA-2023:6195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6196", "reference_id": "RHSA-2023:6196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6197", "reference_id": "RHSA-2023:6197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6198", "reference_id": "RHSA-2023:6198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6199", "reference_id": "RHSA-2023:6199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6199" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1852729", "reference_id": "show_bug.cgi?id=1852729", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1852729" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" }, { "reference_url": "https://usn.ubuntu.com/6468-1/", "reference_id": "USN-6468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5728" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4f4y-p7h8-dygq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51443?format=api", "vulnerability_id": "VCID-52ha-qvpu-ruc8", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13701", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13783", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13919", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13876", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13791", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13695", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13924", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13757", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13789", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13767", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1398", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219750", "reference_id": "2219750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219750" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5450", "reference_id": "dsa-5450", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5450" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5451", "reference_id": "dsa-5451", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5451" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-23/", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-23/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-24/", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-24/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4062", "reference_id": "RHSA-2023:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4063", "reference_id": "RHSA-2023:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4064", "reference_id": "RHSA-2023:4064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4065", "reference_id": "RHSA-2023:4065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4066", "reference_id": "RHSA-2023:4066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4067", "reference_id": "RHSA-2023:4067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4068", "reference_id": "RHSA-2023:4068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4069", "reference_id": "RHSA-2023:4069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4070", "reference_id": "RHSA-2023:4070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4071", "reference_id": "RHSA-2023:4071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4071" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4072", "reference_id": "RHSA-2023:4072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4073", "reference_id": "RHSA-2023:4073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4074", "reference_id": "RHSA-2023:4074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4075", "reference_id": "RHSA-2023:4075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4075" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4076", "reference_id": "RHSA-2023:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4079", "reference_id": "RHSA-2023:4079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4079" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837675", "reference_id": "show_bug.cgi?id=1837675", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837675" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" }, { "reference_url": "https://usn.ubuntu.com/6214-1/", "reference_id": "USN-6214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6214-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-37208" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-qvpu-ruc8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51437?format=api", "vulnerability_id": "VCID-5qf5-d44c-t7gu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5868", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58675", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58643", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58682", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58636", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63297", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63264", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63283", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255368", "reference_id": "2255368", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255368" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5581", "reference_id": "dsa-5581", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5581" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5582", "reference_id": "dsa-5582", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5582" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-54/", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-54/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-55/", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-55/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", "reference_id": "msg00020.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868042", "reference_id": "show_bug.cgi?id=1868042", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868042" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6862" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51410?format=api", "vulnerability_id": "VCID-6s88-vfr8-u3hj", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41081", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41107", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41065", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41113", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.4104", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41089", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41096", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41115", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00191", "scoring_system": "epss", "scoring_elements": "0.41078", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42326", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42329", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00203", "scoring_system": "epss", "scoring_elements": "0.42393", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4585" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236086", "reference_id": "2236086", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236086" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999", "reference_id": "buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4585" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6s88-vfr8-u3hj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51388?format=api", "vulnerability_id": "VCID-6tm9-1vsh-1qa3", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66804", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66769", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66837", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66851", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.6683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66816", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00519", "scoring_system": "epss", "scoring_elements": "0.66767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.69024", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.68966", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00582", "scoring_system": "epss", "scoring_elements": "0.69017", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228362", "reference_id": "2228362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228362" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839073", "reference_id": "show_bug.cgi?id=1839073", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839073" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4047" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6tm9-1vsh-1qa3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51414?format=api", "vulnerability_id": "VCID-6zjy-1agk-nbd9", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63482", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63469", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63452", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63466", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63458", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.6346", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63459", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5174" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240895", "reference_id": "2240895", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240895" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-42/", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-43/", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-43/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1848454", "reference_id": "show_bug.cgi?id=1848454", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1848454" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5174" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6zjy-1agk-nbd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51399?format=api", "vulnerability_id": "VCID-75sb-xb3r-3fa8", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4573.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4573.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4573", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33312", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33293", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40779", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40752", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40765", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40796", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40804", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236071", "reference_id": "2236071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236071" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-35/", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-37/", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846687", "reference_id": "show_bug.cgi?id=1846687", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846687" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6368-1/", "reference_id": "USN-6368-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6368-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4573" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-75sb-xb3r-3fa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51398?format=api", "vulnerability_id": "VCID-7sbd-1n7f-ryed", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4057", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.44044", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00215", "scoring_system": "epss", "scoring_elements": "0.43995", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44609", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4463", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44622", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44639", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.4461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0022", "scoring_system": "epss", "scoring_elements": "0.44658", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228371", "reference_id": "2228371", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228371" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841682", "reference_id": "show_bug.cgi?id=1841682", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841682" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4057" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7sbd-1n7f-ryed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44362?format=api", "vulnerability_id": "VCID-7x5h-kej1-e3ef", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63291", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63354", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.6337", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63359", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63352", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63317", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65955", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65966", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65942", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259932", "reference_id": "2259932", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259932" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1865689", "reference_id": "show_bug.cgi?id=1865689", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1865689" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0751" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7x5h-kej1-e3ef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51390?format=api", "vulnerability_id": "VCID-878b-mn4w-wkg4", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43903", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43899", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43947", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52876", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52951", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.5285", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52844", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52907", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52939", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52895", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228364", "reference_id": "2228364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228364" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842658", "reference_id": "show_bug.cgi?id=1842658", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842658" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4049" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-878b-mn4w-wkg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51425?format=api", "vulnerability_id": "VCID-87mf-fznn-m3gy", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61657", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61564", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61613", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61648", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61637", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61659", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61664", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61649", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61641", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61565", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61594", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250897", "reference_id": "2250897", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250897" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5561", "reference_id": "dsa-5561", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5561" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-49/", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-49/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-50/", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-50/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-52/", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-52/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html", "reference_id": "msg00030.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7499", "reference_id": "RHSA-2023:7499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7500", "reference_id": "RHSA-2023:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7501", "reference_id": "RHSA-2023:7501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7502", "reference_id": "RHSA-2023:7502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7503", "reference_id": "RHSA-2023:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7504", "reference_id": "RHSA-2023:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7505", "reference_id": "RHSA-2023:7505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7506", "reference_id": "RHSA-2023:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7507", "reference_id": "RHSA-2023:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7508", "reference_id": "RHSA-2023:7508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7509", "reference_id": "RHSA-2023:7509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7510", "reference_id": "RHSA-2023:7510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7511", "reference_id": "RHSA-2023:7511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7512", "reference_id": "RHSA-2023:7512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7547", "reference_id": "RHSA-2023:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7569", "reference_id": "RHSA-2023:7569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7570", "reference_id": "RHSA-2023:7570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7573", "reference_id": "RHSA-2023:7573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7574", "reference_id": "RHSA-2023:7574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7577", "reference_id": "RHSA-2023:7577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7577" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1854076", "reference_id": "show_bug.cgi?id=1854076", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1854076" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" }, { "reference_url": "https://usn.ubuntu.com/6515-1/", "reference_id": "USN-6515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6515-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6205" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-87mf-fznn-m3gy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51389?format=api", "vulnerability_id": "VCID-8dgu-ppan-9ub2", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53987", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54021", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.6404", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64082", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64012", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.6407", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64036", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64065", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64079", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64067", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00459", "scoring_system": "epss", "scoring_elements": "0.64051", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228363", "reference_id": "2228363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228363" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841368", "reference_id": "show_bug.cgi?id=1841368", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1841368" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4048" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8dgu-ppan-9ub2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51413?format=api", "vulnerability_id": "VCID-8fny-dsut-7ba3", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5171", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49412", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49355", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49405", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49401", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.4941", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49441", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49444", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49398", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49423", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240894", "reference_id": "2240894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240894" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/", "reference_id": "AY642Z6JZODQJE7Z62CFREVUHEGCXGPD", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5506", "reference_id": "dsa-5506", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5506" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5513", "reference_id": "dsa-5513", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5513" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-42/", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-43/", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-43/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5426", "reference_id": "RHSA-2023:5426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5426" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5427", "reference_id": "RHSA-2023:5427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5428", "reference_id": "RHSA-2023:5428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5429", "reference_id": "RHSA-2023:5429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5430", "reference_id": "RHSA-2023:5430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5432", "reference_id": "RHSA-2023:5432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5433", "reference_id": "RHSA-2023:5433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5434", "reference_id": "RHSA-2023:5434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5435", "reference_id": "RHSA-2023:5435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5436", "reference_id": "RHSA-2023:5436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5437", "reference_id": "RHSA-2023:5437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5438", "reference_id": "RHSA-2023:5438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5439", "reference_id": "RHSA-2023:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5440", "reference_id": "RHSA-2023:5440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5475", "reference_id": "RHSA-2023:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5477", "reference_id": "RHSA-2023:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5477" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1851599", "reference_id": "show_bug.cgi?id=1851599", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1851599" }, { "reference_url": "https://usn.ubuntu.com/6404-1/", "reference_id": "USN-6404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6404-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5171" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fny-dsut-7ba3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51422?format=api", "vulnerability_id": "VCID-8m89-ma2u-5fgu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5730.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5730.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5730", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.63392", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00444", "scoring_system": "epss", "scoring_elements": "0.6341", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65602", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65535", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.655", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65564", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.6559", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65578", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.6557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00489", "scoring_system": "epss", "scoring_elements": "0.65583", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245906", "reference_id": "2245906", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245906" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695", "reference_id": "buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5535", "reference_id": "dsa-5535", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5535" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5538", "reference_id": "dsa-5538", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5538" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html", "reference_id": "msg00037.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6162", "reference_id": "RHSA-2023:6162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6185", "reference_id": "RHSA-2023:6185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6186", "reference_id": "RHSA-2023:6186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6187", "reference_id": "RHSA-2023:6187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6188", "reference_id": "RHSA-2023:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6189", "reference_id": "RHSA-2023:6189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6191", "reference_id": "RHSA-2023:6191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6194", "reference_id": "RHSA-2023:6194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6195", "reference_id": "RHSA-2023:6195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6196", "reference_id": "RHSA-2023:6196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6197", "reference_id": "RHSA-2023:6197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6198", "reference_id": "RHSA-2023:6198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6199", "reference_id": "RHSA-2023:6199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6199" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" }, { "reference_url": "https://usn.ubuntu.com/6468-1/", "reference_id": "USN-6468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5730" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8m89-ma2u-5fgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51405?format=api", "vulnerability_id": "VCID-9dpt-xfu6-cuh5", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4580", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21043", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21165", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00069", "scoring_system": "epss", "scoring_elements": "0.21039", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24104", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23989", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24036", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24053", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24011", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23954", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23964", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.23952", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00082", "scoring_system": "epss", "scoring_elements": "0.24142", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4580" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236079", "reference_id": "2236079", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236079" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843046", "reference_id": "show_bug.cgi?id=1843046", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843046" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4580" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9dpt-xfu6-cuh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51434?format=api", "vulnerability_id": "VCID-9z3s-qfbc-vbdc", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59159", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59175", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.6157", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63625", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63608", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63645", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63654", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63641", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63583", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63609", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63573", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255364", "reference_id": "2255364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255364" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6859" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44434?format=api", "vulnerability_id": "VCID-apes-5sa9-w7gd", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70781", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00646", "scoring_system": "epss", "scoring_elements": "0.70791", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73288", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73283", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73269", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73233", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73239", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.7326", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73333", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.73324", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00757", "scoring_system": "epss", "scoring_elements": "0.7328", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259934", "reference_id": "2259934", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259934" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701", "reference_id": "buglist.cgi?bug_id=1868456%2C1871445%2C1873701", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0755" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-apes-5sa9-w7gd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51401?format=api", "vulnerability_id": "VCID-bapg-hzuc-ykby", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4575.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4575.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4575", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33312", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33293", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40729", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40779", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40752", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40777", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40765", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40796", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40804", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236073", "reference_id": "2236073", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236073" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-35/", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-37/", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846689", "reference_id": "show_bug.cgi?id=1846689", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846689" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6368-1/", "reference_id": "USN-6368-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6368-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4575" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bapg-hzuc-ykby" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51435?format=api", "vulnerability_id": "VCID-bw96-5g6y-j3c4", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00434", "scoring_system": "epss", "scoring_elements": "0.62881", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63638", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63657", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64619", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64653", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.6464", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64612", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64648", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64659", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64636", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64613", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00471", "scoring_system": "epss", "scoring_elements": "0.64571", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255365", "reference_id": "2255365", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255365" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6860" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51402?format=api", "vulnerability_id": "VCID-cfqv-7r6b-g3e9", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4576", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55559", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55561", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55558", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55549", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55538", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55483", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55463", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55539", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4576" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236074", "reference_id": "2236074", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236074" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-35/", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-37/", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846694", "reference_id": "show_bug.cgi?id=1846694", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846694" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4576" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cfqv-7r6b-g3e9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51441?format=api", "vulnerability_id": "VCID-ch3v-nq5w-3fg4", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37202", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69866", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00611", "scoring_system": "epss", "scoring_elements": "0.69856", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.7117", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71136", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71128", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71183", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71221", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71176", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71192", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00663", "scoring_system": "epss", "scoring_elements": "0.71153", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219748", "reference_id": "2219748", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219748" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5450", "reference_id": "dsa-5450", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5450" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5451", "reference_id": "dsa-5451", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5451" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-23/", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-23/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-24/", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-24/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4062", "reference_id": "RHSA-2023:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4063", "reference_id": "RHSA-2023:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4064", "reference_id": "RHSA-2023:4064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4065", "reference_id": "RHSA-2023:4065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4066", "reference_id": "RHSA-2023:4066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4067", "reference_id": "RHSA-2023:4067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4068", "reference_id": "RHSA-2023:4068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4069", "reference_id": "RHSA-2023:4069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4070", "reference_id": "RHSA-2023:4070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4071", "reference_id": "RHSA-2023:4071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4071" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4072", "reference_id": "RHSA-2023:4072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4073", "reference_id": "RHSA-2023:4073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4074", "reference_id": "RHSA-2023:4074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4075", "reference_id": "RHSA-2023:4075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4075" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4076", "reference_id": "RHSA-2023:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4079", "reference_id": "RHSA-2023:4079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4079" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1834711", "reference_id": "show_bug.cgi?id=1834711", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1834711" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" }, { "reference_url": "https://usn.ubuntu.com/6214-1/", "reference_id": "USN-6214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6214-1/" }, { "reference_url": "https://usn.ubuntu.com/6227-1/", "reference_id": "USN-6227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-37202" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ch3v-nq5w-3fg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51400?format=api", "vulnerability_id": "VCID-cj16-a2tv-cqd7", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4574.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4574.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4574", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33472", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33312", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00137", "scoring_system": "epss", "scoring_elements": "0.33293", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34806", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34839", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34782", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34803", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34819", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34888", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236072", "reference_id": "2236072", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236072" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-35/", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-37/", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846688", "reference_id": "show_bug.cgi?id=1846688", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846688" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6368-1/", "reference_id": "USN-6368-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6368-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4574" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cj16-a2tv-cqd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51426?format=api", "vulnerability_id": "VCID-e6bs-vk6j-h3e6", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62495", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62485", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62478", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62387", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62418", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62384", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62432", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62449", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62468", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62458", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00428", "scoring_system": "epss", "scoring_elements": "0.62435", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250898", "reference_id": "2250898", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250898" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7499", "reference_id": "RHSA-2023:7499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7500", "reference_id": "RHSA-2023:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7501", "reference_id": "RHSA-2023:7501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7502", "reference_id": "RHSA-2023:7502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7503", "reference_id": "RHSA-2023:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7504", "reference_id": "RHSA-2023:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7505", "reference_id": "RHSA-2023:7505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7506", "reference_id": "RHSA-2023:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7507", "reference_id": "RHSA-2023:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7508", "reference_id": "RHSA-2023:7508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7509", "reference_id": "RHSA-2023:7509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7510", "reference_id": "RHSA-2023:7510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7511", "reference_id": "RHSA-2023:7511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7512", "reference_id": "RHSA-2023:7512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7547", "reference_id": "RHSA-2023:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7569", "reference_id": "RHSA-2023:7569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7570", "reference_id": "RHSA-2023:7570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7573", "reference_id": "RHSA-2023:7573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7574", "reference_id": "RHSA-2023:7574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7577", "reference_id": "RHSA-2023:7577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7577" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" }, { "reference_url": "https://usn.ubuntu.com/6515-1/", "reference_id": "USN-6515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6515-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6206" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e6bs-vk6j-h3e6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51438?format=api", "vulnerability_id": "VCID-f6qv-znt2-2bd5", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.64403", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.6437", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00464", "scoring_system": "epss", "scoring_elements": "0.6439", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66189", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66178", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66214", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66203", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66146", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66173", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66141", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255369", "reference_id": "2255369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255369" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6863" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51424?format=api", "vulnerability_id": "VCID-fwr3-cgq1-a3b4", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50059", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50095", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50055", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50038", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50067", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50016", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50071", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50064", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50082", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.50054", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00266", "scoring_system": "epss", "scoring_elements": "0.5005", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250896", "reference_id": "2250896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250896" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7499", "reference_id": "RHSA-2023:7499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7500", "reference_id": "RHSA-2023:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7501", "reference_id": "RHSA-2023:7501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7502", "reference_id": "RHSA-2023:7502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7503", "reference_id": "RHSA-2023:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7504", "reference_id": "RHSA-2023:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7505", "reference_id": "RHSA-2023:7505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7506", "reference_id": "RHSA-2023:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7507", "reference_id": "RHSA-2023:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7508", "reference_id": "RHSA-2023:7508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7509", "reference_id": "RHSA-2023:7509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7510", "reference_id": "RHSA-2023:7510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7511", "reference_id": "RHSA-2023:7511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7512", "reference_id": "RHSA-2023:7512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7547", "reference_id": "RHSA-2023:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7569", "reference_id": "RHSA-2023:7569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7570", "reference_id": "RHSA-2023:7570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7573", "reference_id": "RHSA-2023:7573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7574", "reference_id": "RHSA-2023:7574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7577", "reference_id": "RHSA-2023:7577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7577" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" }, { "reference_url": "https://usn.ubuntu.com/6515-1/", "reference_id": "USN-6515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6515-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6204" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwr3-cgq1-a3b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51423?format=api", "vulnerability_id": "VCID-g5z1-9an3-aubs", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5732.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5732.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5732", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52371", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52361", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54992", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54948", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54986", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.54993", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.55004", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00319", "scoring_system": "epss", "scoring_elements": "0.55001", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245898", "reference_id": "2245898", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245898" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5535", "reference_id": "dsa-5535", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5535" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5538", "reference_id": "dsa-5538", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5538" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html", "reference_id": "msg00037.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6162", "reference_id": "RHSA-2023:6162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6185", "reference_id": "RHSA-2023:6185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6186", "reference_id": "RHSA-2023:6186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6187", "reference_id": "RHSA-2023:6187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6188", "reference_id": "RHSA-2023:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6189", "reference_id": "RHSA-2023:6189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6191", "reference_id": "RHSA-2023:6191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6194", "reference_id": "RHSA-2023:6194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6195", "reference_id": "RHSA-2023:6195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6196", "reference_id": "RHSA-2023:6196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6197", "reference_id": "RHSA-2023:6197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6198", "reference_id": "RHSA-2023:6198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6199", "reference_id": "RHSA-2023:6199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6199" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1690979", "reference_id": "show_bug.cgi?id=1690979", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1690979" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836962", "reference_id": "show_bug.cgi?id=1836962", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836962" }, { "reference_url": "https://usn.ubuntu.com/6468-1/", "reference_id": "USN-6468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5732" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g5z1-9an3-aubs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51440?format=api", "vulnerability_id": "VCID-gs3s-s4zk-fyh4", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72333", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72279", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72324", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73191", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73241", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73291", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73282", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73266", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00755", "scoring_system": "epss", "scoring_elements": "0.73217", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219747", "reference_id": "2219747", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219747" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5450", "reference_id": "dsa-5450", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5450" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5451", "reference_id": "dsa-5451", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5451" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-23/", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-23/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-24/", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-24/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4062", "reference_id": "RHSA-2023:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4063", "reference_id": "RHSA-2023:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4064", "reference_id": "RHSA-2023:4064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4065", "reference_id": "RHSA-2023:4065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4066", "reference_id": "RHSA-2023:4066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4067", "reference_id": "RHSA-2023:4067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4068", "reference_id": "RHSA-2023:4068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4069", "reference_id": "RHSA-2023:4069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4070", "reference_id": "RHSA-2023:4070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4071", "reference_id": "RHSA-2023:4071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4071" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4072", "reference_id": "RHSA-2023:4072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4073", "reference_id": "RHSA-2023:4073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4074", "reference_id": "RHSA-2023:4074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4075", "reference_id": "RHSA-2023:4075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4075" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4076", "reference_id": "RHSA-2023:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4079", "reference_id": "RHSA-2023:4079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4079" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826002", "reference_id": "show_bug.cgi?id=1826002", "reference_type": "", "scores": [ { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826002" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" }, { "reference_url": "https://usn.ubuntu.com/6214-1/", "reference_id": "USN-6214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6214-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-37201" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs3s-s4zk-fyh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51409?format=api", "vulnerability_id": "VCID-j1yh-f1np-wbcv", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4584.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4584.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4584", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.5101", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.51004", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50966", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50982", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50923", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50949", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50907", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50964", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.51003", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00275", "scoring_system": "epss", "scoring_elements": "0.50961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52579", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52618", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00292", "scoring_system": "epss", "scoring_elements": "0.52568", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236084", "reference_id": "2236084", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236084" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6368-1/", "reference_id": "USN-6368-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6368-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4584" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j1yh-f1np-wbcv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51393?format=api", "vulnerability_id": "VCID-j2ax-jb2h-byeu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4052", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39181", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.3951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39472", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39455", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39393", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39198", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39515", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.39484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00179", "scoring_system": "epss", "scoring_elements": "0.395", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4052" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228369", "reference_id": "2228369", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228369" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1824420", "reference_id": "show_bug.cgi?id=1824420", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1824420" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4052" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j2ax-jb2h-byeu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51446?format=api", "vulnerability_id": "VCID-j45f-m9q5-vfah", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50762.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50762.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40163", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.4015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40104", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40124", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52273", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52266", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255379", "reference_id": "2255379", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255379" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-50762" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j45f-m9q5-vfah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51412?format=api", "vulnerability_id": "VCID-jzte-jqk6-7ya6", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5169", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47059", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47125", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.4705", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47069", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47071", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47016", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47129", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47073", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47066", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0024", "scoring_system": "epss", "scoring_elements": "0.47092", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240893", "reference_id": "2240893", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240893" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/", "reference_id": "AY642Z6JZODQJE7Z62CFREVUHEGCXGPD", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5506", "reference_id": "dsa-5506", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5506" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5513", "reference_id": "dsa-5513", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5513" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-42/", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-43/", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-43/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5426", "reference_id": "RHSA-2023:5426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5426" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5427", "reference_id": "RHSA-2023:5427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5428", "reference_id": "RHSA-2023:5428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5429", "reference_id": "RHSA-2023:5429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5430", "reference_id": "RHSA-2023:5430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5432", "reference_id": "RHSA-2023:5432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5433", "reference_id": "RHSA-2023:5433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5434", "reference_id": "RHSA-2023:5434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5435", "reference_id": "RHSA-2023:5435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5436", "reference_id": "RHSA-2023:5436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5437", "reference_id": "RHSA-2023:5437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5438", "reference_id": "RHSA-2023:5438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5439", "reference_id": "RHSA-2023:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5440", "reference_id": "RHSA-2023:5440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5475", "reference_id": "RHSA-2023:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5477", "reference_id": "RHSA-2023:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5477" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846685", "reference_id": "show_bug.cgi?id=1846685", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846685" }, { "reference_url": "https://usn.ubuntu.com/6404-1/", "reference_id": "USN-6404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6404-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5169" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jzte-jqk6-7ya6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51432?format=api", "vulnerability_id": "VCID-kskc-agaw-8bcr", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40745", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40775", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40755", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40783", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40707", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40757", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.4073", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00189", "scoring_system": "epss", "scoring_elements": "0.40749", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45428", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00227", "scoring_system": "epss", "scoring_elements": "0.45418", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255362", "reference_id": "2255362", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255362" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6857" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51391?format=api", "vulnerability_id": "VCID-m2sr-re2h-3baq", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03401", "scoring_system": "epss", "scoring_elements": "0.87455", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03401", "scoring_system": "epss", "scoring_elements": "0.87448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03401", "scoring_system": "epss", "scoring_elements": "0.87432", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89233", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89273", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89218", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89235", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.8926", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89263", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89257", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04614", "scoring_system": "epss", "scoring_elements": "0.89253", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228365", "reference_id": "2228365", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228365" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843038", "reference_id": "show_bug.cgi?id=1843038", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843038" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4050" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2sr-re2h-3baq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51416?format=api", "vulnerability_id": "VCID-mh92-65bz-43ds", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5721.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5721.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5721", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54054", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54094", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54089", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.5405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54012", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.53988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54039", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.54068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00309", "scoring_system": "epss", "scoring_elements": "0.53985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56011", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56086", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245896", "reference_id": "2245896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245896" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5535", "reference_id": "dsa-5535", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5535" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5538", "reference_id": "dsa-5538", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5538" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html", "reference_id": "msg00037.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6162", "reference_id": "RHSA-2023:6162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6185", "reference_id": "RHSA-2023:6185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6186", "reference_id": "RHSA-2023:6186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6187", "reference_id": "RHSA-2023:6187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6188", "reference_id": "RHSA-2023:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6189", "reference_id": "RHSA-2023:6189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6191", "reference_id": "RHSA-2023:6191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6194", "reference_id": "RHSA-2023:6194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6195", "reference_id": "RHSA-2023:6195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6196", "reference_id": "RHSA-2023:6196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6197", "reference_id": "RHSA-2023:6197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6198", "reference_id": "RHSA-2023:6198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6199", "reference_id": "RHSA-2023:6199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6199" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1830820", "reference_id": "show_bug.cgi?id=1830820", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1830820" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" }, { "reference_url": "https://usn.ubuntu.com/6468-1/", "reference_id": "USN-6468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5721" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mh92-65bz-43ds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51417?format=api", "vulnerability_id": "VCID-mj7n-8hf6-2qar", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5724.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5724.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69645", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69697", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74629", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74596", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74588", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74551", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74534", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.74508", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00831", "scoring_system": "epss", "scoring_elements": "0.7454", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245899", "reference_id": "2245899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245899" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5535", "reference_id": "dsa-5535", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5535" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5538", "reference_id": "dsa-5538", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5538" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html", "reference_id": "msg00037.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6162", "reference_id": "RHSA-2023:6162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6185", "reference_id": "RHSA-2023:6185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6186", "reference_id": "RHSA-2023:6186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6187", "reference_id": "RHSA-2023:6187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6188", "reference_id": "RHSA-2023:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6189", "reference_id": "RHSA-2023:6189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6191", "reference_id": "RHSA-2023:6191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6194", "reference_id": "RHSA-2023:6194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6195", "reference_id": "RHSA-2023:6195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6196", "reference_id": "RHSA-2023:6196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6197", "reference_id": "RHSA-2023:6197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6198", "reference_id": "RHSA-2023:6198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6199", "reference_id": "RHSA-2023:6199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6199" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836705", "reference_id": "show_bug.cgi?id=1836705", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836705" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" }, { "reference_url": "https://usn.ubuntu.com/6468-1/", "reference_id": "USN-6468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5724" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mj7n-8hf6-2qar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51442?format=api", "vulnerability_id": "VCID-mwj3-wa1g-buay", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61571", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61568", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00414", "scoring_system": "epss", "scoring_elements": "0.61555", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66056", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66011", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66068", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66093", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66078", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66043", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66074", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66087", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00502", "scoring_system": "epss", "scoring_elements": "0.66039", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219749", "reference_id": "2219749", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219749" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5450", "reference_id": "dsa-5450", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5450" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5451", "reference_id": "dsa-5451", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5451" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-23/", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-23/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-24/", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-24/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4062", "reference_id": "RHSA-2023:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4063", "reference_id": "RHSA-2023:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4064", "reference_id": "RHSA-2023:4064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4065", "reference_id": "RHSA-2023:4065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4066", "reference_id": "RHSA-2023:4066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4067", "reference_id": "RHSA-2023:4067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4068", "reference_id": "RHSA-2023:4068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4069", "reference_id": "RHSA-2023:4069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4070", "reference_id": "RHSA-2023:4070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4071", "reference_id": "RHSA-2023:4071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4071" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4072", "reference_id": "RHSA-2023:4072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4073", "reference_id": "RHSA-2023:4073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4074", "reference_id": "RHSA-2023:4074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4075", "reference_id": "RHSA-2023:4075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4075" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4076", "reference_id": "RHSA-2023:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4079", "reference_id": "RHSA-2023:4079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4079" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1816287", "reference_id": "show_bug.cgi?id=1816287", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1816287" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" }, { "reference_url": "https://usn.ubuntu.com/6214-1/", "reference_id": "USN-6214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6214-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-37207" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwj3-wa1g-buay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51445?format=api", "vulnerability_id": "VCID-nq6f-ezcx-mfas", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50761.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50761.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40163", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.4015", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40123", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40104", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40124", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00184", "scoring_system": "epss", "scoring_elements": "0.40154", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52273", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00288", "scoring_system": "epss", "scoring_elements": "0.52266", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255378", "reference_id": "2255378", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255378" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-50761" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nq6f-ezcx-mfas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51439?format=api", "vulnerability_id": "VCID-pepm-1t68-uuf1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65732", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65706", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00493", "scoring_system": "epss", "scoring_elements": "0.65721", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69223", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69208", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.6918", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69219", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69228", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69201", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.6913", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69151", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0059", "scoring_system": "epss", "scoring_elements": "0.69132", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255370", "reference_id": "2255370", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255370" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6864" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51403?format=api", "vulnerability_id": "VCID-pv9q-fcta-ffbq", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4577", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27718", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28073", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2803", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27915", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.2783", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28118", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.27958", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28025", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00102", "scoring_system": "epss", "scoring_elements": "0.28067", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4577" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236075", "reference_id": "2236075", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236075" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847397", "reference_id": "show_bug.cgi?id=1847397", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847397" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4577" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pv9q-fcta-ffbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44181?format=api", "vulnerability_id": "VCID-pvvt-h3mh-33eb", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.47284", "scoring_system": "epss", "scoring_elements": "0.97698", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.47284", "scoring_system": "epss", "scoring_elements": "0.97699", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97774", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97757", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97782", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.9778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97764", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97759", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97756", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97772", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.9777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.49052", "scoring_system": "epss", "scoring_elements": "0.97767", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259926", "reference_id": "2259926", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259926" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1864587", "reference_id": "show_bug.cgi?id=1864587", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1864587" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0741" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pvvt-h3mh-33eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51429?format=api", "vulnerability_id": "VCID-pybb-2ny2-quas", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5933", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59365", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59371", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5932", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59284", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59335", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59348", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59367", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5935", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59332", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250901", "reference_id": "2250901", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250901" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7499", "reference_id": "RHSA-2023:7499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7500", "reference_id": "RHSA-2023:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7501", "reference_id": "RHSA-2023:7501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7502", "reference_id": "RHSA-2023:7502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7503", "reference_id": "RHSA-2023:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7504", "reference_id": "RHSA-2023:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7505", "reference_id": "RHSA-2023:7505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7506", "reference_id": "RHSA-2023:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7507", "reference_id": "RHSA-2023:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7508", "reference_id": "RHSA-2023:7508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7509", "reference_id": "RHSA-2023:7509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7510", "reference_id": "RHSA-2023:7510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7511", "reference_id": "RHSA-2023:7511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7512", "reference_id": "RHSA-2023:7512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7547", "reference_id": "RHSA-2023:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7569", "reference_id": "RHSA-2023:7569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7570", "reference_id": "RHSA-2023:7570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7573", "reference_id": "RHSA-2023:7573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7574", "reference_id": "RHSA-2023:7574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7577", "reference_id": "RHSA-2023:7577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7577" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" }, { "reference_url": "https://usn.ubuntu.com/6515-1/", "reference_id": "USN-6515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6515-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6209" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pybb-2ny2-quas" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51431?format=api", "vulnerability_id": "VCID-qdqj-rhcr-wbca", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10471", "scoring_system": "epss", "scoring_elements": "0.9327", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.10471", "scoring_system": "epss", "scoring_elements": "0.93273", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10471", "scoring_system": "epss", "scoring_elements": "0.93268", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93422", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93441", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93446", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93397", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93405", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10986", "scoring_system": "epss", "scoring_elements": "0.93413", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255360", "reference_id": "2255360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255360" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6856" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51415?format=api", "vulnerability_id": "VCID-rbna-kkn2-2baj", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5176", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72172", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72163", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72047", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72119", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72126", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72092", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.7208", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72043", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72085", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.721", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00704", "scoring_system": "epss", "scoring_elements": "0.72115", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240896", "reference_id": "2240896", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240896" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195", "reference_id": "buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5506", "reference_id": "dsa-5506", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5506" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5513", "reference_id": "dsa-5513", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5513" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-41" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", "reference_id": "mfsa2023-41", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-42" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-42/", "reference_id": "mfsa2023-42", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-42/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-43" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-43/", "reference_id": "mfsa2023-43", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-43/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html", "reference_id": "msg00034.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5426", "reference_id": "RHSA-2023:5426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5426" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5427", "reference_id": "RHSA-2023:5427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5428", "reference_id": "RHSA-2023:5428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5429", "reference_id": "RHSA-2023:5429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5430", "reference_id": "RHSA-2023:5430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5432", "reference_id": "RHSA-2023:5432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5433", "reference_id": "RHSA-2023:5433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5434", "reference_id": "RHSA-2023:5434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5435", "reference_id": "RHSA-2023:5435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5436", "reference_id": "RHSA-2023:5436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5437", "reference_id": "RHSA-2023:5437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5438", "reference_id": "RHSA-2023:5438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5439", "reference_id": "RHSA-2023:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5440", "reference_id": "RHSA-2023:5440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5475", "reference_id": "RHSA-2023:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5477", "reference_id": "RHSA-2023:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5477" }, { "reference_url": "https://usn.ubuntu.com/6404-1/", "reference_id": "USN-6404-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6404-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5176" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rbna-kkn2-2baj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51385?format=api", "vulnerability_id": "VCID-s3vw-7gyn-ubdt", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3600.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39276", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39362", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.3906", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.39041", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39832", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39776", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39854", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39819", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39802", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39852", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00181", "scoring_system": "epss", "scoring_elements": "0.39855", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3600" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222652", "reference_id": "2222652", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222652" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-26", "reference_id": "mfsa2023-26", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-26" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-26/", "reference_id": "mfsa2023-26", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-26/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-27", "reference_id": "mfsa2023-27", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-27" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-27/", "reference_id": "mfsa2023-27", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-27/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5426", "reference_id": "RHSA-2023:5426", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5426" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5427", "reference_id": "RHSA-2023:5427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5428", "reference_id": "RHSA-2023:5428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5429", "reference_id": "RHSA-2023:5429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5430", "reference_id": "RHSA-2023:5430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5432", "reference_id": "RHSA-2023:5432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5433", "reference_id": "RHSA-2023:5433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5434", "reference_id": "RHSA-2023:5434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5435", "reference_id": "RHSA-2023:5435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5436", "reference_id": "RHSA-2023:5436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5437", "reference_id": "RHSA-2023:5437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5438", "reference_id": "RHSA-2023:5438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5439", "reference_id": "RHSA-2023:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5440", "reference_id": "RHSA-2023:5440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5475", "reference_id": "RHSA-2023:5475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5477", "reference_id": "RHSA-2023:5477", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5477" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839703", "reference_id": "show_bug.cgi?id=1839703", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839703" }, { "reference_url": "https://usn.ubuntu.com/6218-1/", "reference_id": "USN-6218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6218-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-3600" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s3vw-7gyn-ubdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51406?format=api", "vulnerability_id": "VCID-sfyj-m6xa-8bbc", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4581.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36844", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36626", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0016", "scoring_system": "epss", "scoring_elements": "0.36594", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38106", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38066", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38116", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38124", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38142", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38082", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38173", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38108", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38128", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00169", "scoring_system": "epss", "scoring_elements": "0.38196", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236080", "reference_id": "2236080", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236080" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-35" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-35/", "reference_id": "mfsa2023-35", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-35/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-37" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-37/", "reference_id": "mfsa2023-37", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-37/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843758", "reference_id": "show_bug.cgi?id=1843758", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1843758" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6368-1/", "reference_id": "USN-6368-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6368-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4581" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sfyj-m6xa-8bbc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51386?format=api", "vulnerability_id": "VCID-sh7r-dftz-kyhn", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46459", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46448", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00235", "scoring_system": "epss", "scoring_elements": "0.46466", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55474", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55538", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55498", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55515", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55526", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55471", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00325", "scoring_system": "epss", "scoring_elements": "0.55534", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228360", "reference_id": "2228360", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228360" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1833876", "reference_id": "show_bug.cgi?id=1833876", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1833876" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4045" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sh7r-dftz-kyhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51407?format=api", "vulnerability_id": "VCID-snbc-j4e3-uff1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4582", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.6616", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00657", "scoring_system": "epss", "scoring_elements": "0.71103", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00718", "scoring_system": "epss", "scoring_elements": "0.72395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74036", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73966", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74014", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74018", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74051", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74059", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.7405", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.74011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00798", "scoring_system": "epss", "scoring_elements": "0.73995", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4582" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236081", "reference_id": "2236081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236081" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773874", "reference_id": "show_bug.cgi?id=1773874", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773874" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4582" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snbc-j4e3-uff1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44270?format=api", "vulnerability_id": "VCID-t4rc-yuj8-n7au", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61411", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61413", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00411", "scoring_system": "epss", "scoring_elements": "0.61399", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63464", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63498", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.6348", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63437", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63429", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63507", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.635", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63465", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63499", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00446", "scoring_system": "epss", "scoring_elements": "0.63515", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259928", "reference_id": "2259928", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259928" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1660223", "reference_id": "show_bug.cgi?id=1660223", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1660223" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0746" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t4rc-yuj8-n7au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51397?format=api", "vulnerability_id": "VCID-t8gg-ptc1-qfdw", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69699", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69691", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00605", "scoring_system": "epss", "scoring_elements": "0.69638", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71232", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71307", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71207", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.713", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.7127", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71286", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00667", "scoring_system": "epss", "scoring_elements": "0.71249", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4056" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228370", "reference_id": "2228370", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228370" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847", "reference_id": "buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4056" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t8gg-ptc1-qfdw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51395?format=api", "vulnerability_id": "VCID-tfny-yt17-mffx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4054", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09254", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09281", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09284", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0924", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09255", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09319", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0927", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09114", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09242", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4054" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228366", "reference_id": "2228366", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228366" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-32/", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-32/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-33/", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-33/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1840777", "reference_id": "show_bug.cgi?id=1840777", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1840777" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4054" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tfny-yt17-mffx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51433?format=api", "vulnerability_id": "VCID-tps4-kxe2-5ugb", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.6178", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61764", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63748", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63723", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63777", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.6376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63708", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63788", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63778", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63776", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00452", "scoring_system": "epss", "scoring_elements": "0.63791", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255363", "reference_id": "2255363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255363" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5581", "reference_id": "dsa-5581", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5581" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5582", "reference_id": "dsa-5582", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5582" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-54/", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-54/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-55/", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-55/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-56/", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-56/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html", "reference_id": "msg00020.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html", "reference_id": "msg00021.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826791", "reference_id": "show_bug.cgi?id=1826791", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1826791" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6858" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51408?format=api", "vulnerability_id": "VCID-tq43-rx5u-eybv", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4583", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35011", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34933", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34978", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35007", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34975", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35026", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34682", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34701", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34974", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.3499", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35053", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4583" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236082", "reference_id": "2236082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236082" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-34" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-34/", "reference_id": "mfsa2023-34", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-34/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842030", "reference_id": "show_bug.cgi?id=1842030", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842030" }, { "reference_url": "https://usn.ubuntu.com/6320-1/", "reference_id": "USN-6320-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6320-1/" }, { "reference_url": "https://usn.ubuntu.com/6405-1/", "reference_id": "USN-6405-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6405-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4583" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tq43-rx5u-eybv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51427?format=api", "vulnerability_id": "VCID-tutg-2zzk-4uam", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63934", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63906", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63915", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63922", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63836", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.63917", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00456", "scoring_system": "epss", "scoring_elements": "0.6387", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250899", "reference_id": "2250899", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250899" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7499", "reference_id": "RHSA-2023:7499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7500", "reference_id": "RHSA-2023:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7501", "reference_id": "RHSA-2023:7501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7502", "reference_id": "RHSA-2023:7502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7503", "reference_id": "RHSA-2023:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7504", "reference_id": "RHSA-2023:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7505", "reference_id": "RHSA-2023:7505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7506", "reference_id": "RHSA-2023:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7507", "reference_id": "RHSA-2023:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7508", "reference_id": "RHSA-2023:7508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7509", "reference_id": "RHSA-2023:7509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7510", "reference_id": "RHSA-2023:7510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7511", "reference_id": "RHSA-2023:7511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7512", "reference_id": "RHSA-2023:7512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7547", "reference_id": "RHSA-2023:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7569", "reference_id": "RHSA-2023:7569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7570", "reference_id": "RHSA-2023:7570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7573", "reference_id": "RHSA-2023:7573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7574", "reference_id": "RHSA-2023:7574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7577", "reference_id": "RHSA-2023:7577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7577" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" }, { "reference_url": "https://usn.ubuntu.com/6515-1/", "reference_id": "USN-6515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6515-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6207" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tutg-2zzk-4uam" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44287?format=api", "vulnerability_id": "VCID-uh95-a456-7kbx", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6351", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63572", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63571", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63586", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6357", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63501", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.63537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00448", "scoring_system": "epss", "scoring_elements": "0.6358", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64214", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64248", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00462", "scoring_system": "epss", "scoring_elements": "0.64235", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259929", "reference_id": "2259929", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259929" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1764343", "reference_id": "show_bug.cgi?id=1764343", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1764343" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0747" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uh95-a456-7kbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51387?format=api", "vulnerability_id": "VCID-vjw1-g5kk-zuda", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43888", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43885", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43933", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.5283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52898", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52878", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52894", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52843", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00296", "scoring_system": "epss", "scoring_elements": "0.52849", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228361", "reference_id": "2228361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228361" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5464", "reference_id": "dsa-5464", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5464" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5469", "reference_id": "dsa-5469", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5469" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-30" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-30/", "reference_id": "mfsa2023-30", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-30/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-31" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-31/", "reference_id": "mfsa2023-31", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-31/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32", "reference_id": "mfsa2023-32", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-32" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33", "reference_id": "mfsa2023-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-33" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html", "reference_id": "msg00008.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4460", "reference_id": "RHSA-2023:4460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4461", "reference_id": "RHSA-2023:4461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4462", "reference_id": "RHSA-2023:4462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4463", "reference_id": "RHSA-2023:4463", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4463" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4464", "reference_id": "RHSA-2023:4464", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4464" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4465", "reference_id": "RHSA-2023:4465", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4465" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4468", "reference_id": "RHSA-2023:4468", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4468" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4469", "reference_id": "RHSA-2023:4469", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4469" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4492", "reference_id": "RHSA-2023:4492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4493", "reference_id": "RHSA-2023:4493", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4493" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4494", "reference_id": "RHSA-2023:4494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4495", "reference_id": "RHSA-2023:4495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4496", "reference_id": "RHSA-2023:4496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4497", "reference_id": "RHSA-2023:4497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4499", "reference_id": "RHSA-2023:4499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4500", "reference_id": "RHSA-2023:4500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4500" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837686", "reference_id": "show_bug.cgi?id=1837686", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1837686" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" }, { "reference_url": "https://usn.ubuntu.com/6333-1/", "reference_id": "USN-6333-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6333-1/" }, { "reference_url": "https://usn.ubuntu.com/6406-1/", "reference_id": "USN-6406-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6406-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4046" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vjw1-g5kk-zuda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51428?format=api", "vulnerability_id": "VCID-vma9-r6uy-p7c1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.64004", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63985", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63973", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63992", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.6392", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63947", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63906", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63956", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63974", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63986", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63939", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00457", "scoring_system": "epss", "scoring_elements": "0.63975", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250900", "reference_id": "2250900", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250900" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7499", "reference_id": "RHSA-2023:7499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7500", "reference_id": "RHSA-2023:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7501", "reference_id": "RHSA-2023:7501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7502", "reference_id": "RHSA-2023:7502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7503", "reference_id": "RHSA-2023:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7504", "reference_id": "RHSA-2023:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7505", "reference_id": "RHSA-2023:7505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7506", "reference_id": "RHSA-2023:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7507", "reference_id": "RHSA-2023:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7508", "reference_id": "RHSA-2023:7508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7509", "reference_id": "RHSA-2023:7509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7510", "reference_id": "RHSA-2023:7510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7511", "reference_id": "RHSA-2023:7511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7512", "reference_id": "RHSA-2023:7512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7547", "reference_id": "RHSA-2023:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7569", "reference_id": "RHSA-2023:7569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7570", "reference_id": "RHSA-2023:7570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7573", "reference_id": "RHSA-2023:7573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7574", "reference_id": "RHSA-2023:7574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7577", "reference_id": "RHSA-2023:7577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7577" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" }, { "reference_url": "https://usn.ubuntu.com/6515-1/", "reference_id": "USN-6515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6515-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6208" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vma9-r6uy-p7c1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51444?format=api", "vulnerability_id": "VCID-vmm4-dq3p-kqhu", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64532", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64499", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00468", "scoring_system": "epss", "scoring_elements": "0.64519", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68267", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68222", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68216", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68282", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68312", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68301", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68261", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68295", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68308", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0056", "scoring_system": "epss", "scoring_elements": "0.68241", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-37211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219751", "reference_id": "2219751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219751" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450", "reference_id": "buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5450", "reference_id": "dsa-5450", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5450" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5451", "reference_id": "dsa-5451", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5451" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-22" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-22/", "reference_id": "mfsa2023-22", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-22/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-23" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-23/", "reference_id": "mfsa2023-23", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-23/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-24" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-24/", "reference_id": "mfsa2023-24", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-24/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html", "reference_id": "msg00006.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4062", "reference_id": "RHSA-2023:4062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4062" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4063", "reference_id": "RHSA-2023:4063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4064", "reference_id": "RHSA-2023:4064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4065", "reference_id": "RHSA-2023:4065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4066", "reference_id": "RHSA-2023:4066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4067", "reference_id": "RHSA-2023:4067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4068", "reference_id": "RHSA-2023:4068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4069", "reference_id": "RHSA-2023:4069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4070", "reference_id": "RHSA-2023:4070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4071", "reference_id": "RHSA-2023:4071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4071" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4072", "reference_id": "RHSA-2023:4072", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4072" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4073", "reference_id": "RHSA-2023:4073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4074", "reference_id": "RHSA-2023:4074", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4074" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4075", "reference_id": "RHSA-2023:4075", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4075" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4076", "reference_id": "RHSA-2023:4076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4079", "reference_id": "RHSA-2023:4079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4079" }, { "reference_url": "https://usn.ubuntu.com/6201-1/", "reference_id": "USN-6201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6201-1/" }, { "reference_url": "https://usn.ubuntu.com/6214-1/", "reference_id": "USN-6214-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6214-1/" }, { "reference_url": "https://usn.ubuntu.com/6227-1/", "reference_id": "USN-6227-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6227-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-37211" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vmm4-dq3p-kqhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51420?format=api", "vulnerability_id": "VCID-vw4n-4r41-ukbp", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43671", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43771", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43791", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43804", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43795", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43728", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43666", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43758", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43783", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00212", "scoring_system": "epss", "scoring_elements": "0.43716", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5727" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245902", "reference_id": "2245902", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245902" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847180", "reference_id": "show_bug.cgi?id=1847180", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1847180" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5727" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vw4n-4r41-ukbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44323?format=api", "vulnerability_id": "VCID-vwkf-9gfp-d3cy", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55715", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55672", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.5569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.5571", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55701", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55698", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55646", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55669", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56547", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56593", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00338", "scoring_system": "epss", "scoring_elements": "0.56528", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259930", "reference_id": "2259930", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259930" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1813463", "reference_id": "show_bug.cgi?id=1813463", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1813463" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0749" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vwkf-9gfp-d3cy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44199?format=api", "vulnerability_id": "VCID-xan8-8fq6-yfgd", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82684", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82735", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82738", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82744", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82727", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.8272", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82698", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01786", "scoring_system": "epss", "scoring_elements": "0.82773", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01842", "scoring_system": "epss", "scoring_elements": "0.83001", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01842", "scoring_system": "epss", "scoring_elements": "0.83033", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01842", "scoring_system": "epss", "scoring_elements": "0.83025", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259927", "reference_id": "2259927", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259927" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867152", "reference_id": "show_bug.cgi?id=1867152", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867152" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0742" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xan8-8fq6-yfgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44342?format=api", "vulnerability_id": "VCID-xg25-xm9t-cfb8", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80984", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80992", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.81006", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.80955", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.81022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01479", "scoring_system": "epss", "scoring_elements": "0.81021", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81318", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.81348", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01525", "scoring_system": "epss", "scoring_elements": "0.8134", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259931", "reference_id": "2259931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259931" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1863083", "reference_id": "show_bug.cgi?id=1863083", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1863083" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0750" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg25-xm9t-cfb8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51392?format=api", "vulnerability_id": "VCID-xrg1-azru-5qf1", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4051", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34193", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34205", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34269", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34196", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0014", "scoring_system": "epss", "scoring_elements": "0.34301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36202", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3646", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36232", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4051" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236076", "reference_id": "2236076", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236076" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821884", "reference_id": "show_bug.cgi?id=1821884", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821884" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4051" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xrg1-azru-5qf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44403?format=api", "vulnerability_id": "VCID-y8xv-ss2c-4bhk", "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55602", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00327", "scoring_system": "epss", "scoring_elements": "0.55585", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57791", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57843", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.5784", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57785", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57811", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57815", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57837", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00355", "scoring_system": "epss", "scoring_elements": "0.57842", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259933", "reference_id": "2259933", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259933" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://security.gentoo.org/glsa/202402-26", "reference_id": "GLSA-202402-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-26" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/", "reference_id": "mfsa2024-01", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-02" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-02/", "reference_id": "mfsa2024-02", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-02/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-04" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-04/", "reference_id": "mfsa2024-04", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2024-04/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html", "reference_id": "msg00015.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html", "reference_id": "msg00022.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0559", "reference_id": "RHSA-2024:0559", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0559" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0565", "reference_id": "RHSA-2024:0565", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0565" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0596", "reference_id": "RHSA-2024:0596", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0596" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0598", "reference_id": "RHSA-2024:0598", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0600", "reference_id": "RHSA-2024:0600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0600" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0601", "reference_id": "RHSA-2024:0601", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0601" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0602", "reference_id": "RHSA-2024:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0603", "reference_id": "RHSA-2024:0603", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0603" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0604", "reference_id": "RHSA-2024:0604", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0604" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0605", "reference_id": "RHSA-2024:0605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0608", "reference_id": "RHSA-2024:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0609", "reference_id": "RHSA-2024:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0615", "reference_id": "RHSA-2024:0615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0615" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0616", "reference_id": "RHSA-2024:0616", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0616" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0618", "reference_id": "RHSA-2024:0618", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0619", "reference_id": "RHSA-2024:0619", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0622", "reference_id": "RHSA-2024:0622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0623", "reference_id": "RHSA-2024:0623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0623" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1870262", "reference_id": "show_bug.cgi?id=1870262", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1870262" }, { "reference_url": "https://usn.ubuntu.com/6610-1/", "reference_id": "USN-6610-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6610-1/" }, { "reference_url": "https://usn.ubuntu.com/6669-1/", "reference_id": "USN-6669-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6669-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2024-0753" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y8xv-ss2c-4bhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51430?format=api", "vulnerability_id": "VCID-yd2q-assr-v3er", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59996", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59924", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59988", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59994", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59975", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60014", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60021", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.60007", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59979", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59929", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.59954", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250902", "reference_id": "2250902", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250902" }, { "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782", "reference_id": "buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/" } ], "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5561", "reference_id": "dsa-5561", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5561" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-49" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-49/", "reference_id": "mfsa2023-49", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-49/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-50" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-50/", "reference_id": "mfsa2023-50", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-50/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-52" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-52/", "reference_id": "mfsa2023-52", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-52/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html", "reference_id": "msg00017.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html", "reference_id": "msg00030.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7499", "reference_id": "RHSA-2023:7499", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7499" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7500", "reference_id": "RHSA-2023:7500", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7500" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7501", "reference_id": "RHSA-2023:7501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7502", "reference_id": "RHSA-2023:7502", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7503", "reference_id": "RHSA-2023:7503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7504", "reference_id": "RHSA-2023:7504", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7504" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7505", "reference_id": "RHSA-2023:7505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7506", "reference_id": "RHSA-2023:7506", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7506" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7507", "reference_id": "RHSA-2023:7507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7508", "reference_id": "RHSA-2023:7508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7509", "reference_id": "RHSA-2023:7509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7510", "reference_id": "RHSA-2023:7510", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7511", "reference_id": "RHSA-2023:7511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7512", "reference_id": "RHSA-2023:7512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7547", "reference_id": "RHSA-2023:7547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7547" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7569", "reference_id": "RHSA-2023:7569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7570", "reference_id": "RHSA-2023:7570", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7570" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7573", "reference_id": "RHSA-2023:7573", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7573" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7574", "reference_id": "RHSA-2023:7574", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7577", "reference_id": "RHSA-2023:7577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7577" }, { "reference_url": "https://usn.ubuntu.com/6509-1/", "reference_id": "USN-6509-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6509-1/" }, { "reference_url": "https://usn.ubuntu.com/6515-1/", "reference_id": "USN-6515-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6515-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6212" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yd2q-assr-v3er" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51394?format=api", "vulnerability_id": "VCID-ygrd-4scr-wkau", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4053", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34547", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3485", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34826", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34865", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34849", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34805", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34567", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34904", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34931", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3481", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34855", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34884", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-4053" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236078", "reference_id": "2236078", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236078" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-29" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "reference_id": "mfsa2023-29", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-36" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-36/", "reference_id": "mfsa2023-36", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-36/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-38" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-38/", "reference_id": "mfsa2023-38", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-38/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4945", "reference_id": "RHSA-2023:4945", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4945" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4946", "reference_id": "RHSA-2023:4946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4947", "reference_id": "RHSA-2023:4947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4948", "reference_id": "RHSA-2023:4948", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4948" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4949", "reference_id": "RHSA-2023:4949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4950", "reference_id": "RHSA-2023:4950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4951", "reference_id": "RHSA-2023:4951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4952", "reference_id": "RHSA-2023:4952", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4952" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4954", "reference_id": "RHSA-2023:4954", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4954" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4955", "reference_id": "RHSA-2023:4955", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4955" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4956", "reference_id": "RHSA-2023:4956", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4956" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4957", "reference_id": "RHSA-2023:4957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4958", "reference_id": "RHSA-2023:4958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4959", "reference_id": "RHSA-2023:4959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5019", "reference_id": "RHSA-2023:5019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5019" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839079", "reference_id": "show_bug.cgi?id=1839079", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839079" }, { "reference_url": "https://usn.ubuntu.com/6267-1/", "reference_id": "USN-6267-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6267-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-4053" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ygrd-4scr-wkau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51436?format=api", "vulnerability_id": "VCID-zhu4-sy56-1yea", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.6171", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61704", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61609", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61639", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61694", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61663", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.66006", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65975", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00499", "scoring_system": "epss", "scoring_elements": "0.65995", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255367", "reference_id": "2255367", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255367" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54", "reference_id": "mfsa2023-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-54" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55", "reference_id": "mfsa2023-55", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-55" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56", "reference_id": "mfsa2023-56", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0001", "reference_id": "RHSA-2024:0001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0002", "reference_id": "RHSA-2024:0002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0003", "reference_id": "RHSA-2024:0003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0004", "reference_id": "RHSA-2024:0004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0005", "reference_id": "RHSA-2024:0005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0011", "reference_id": "RHSA-2024:0011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0012", "reference_id": "RHSA-2024:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0019", "reference_id": "RHSA-2024:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0021", "reference_id": "RHSA-2024:0021", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0021" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0022", "reference_id": "RHSA-2024:0022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0023", "reference_id": "RHSA-2024:0023", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0023" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0024", "reference_id": "RHSA-2024:0024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0025", "reference_id": "RHSA-2024:0025", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0026", "reference_id": "RHSA-2024:0026", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0026" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0027", "reference_id": "RHSA-2024:0027", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0027" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0028", "reference_id": "RHSA-2024:0028", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0028" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0029", "reference_id": "RHSA-2024:0029", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0029" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0030", "reference_id": "RHSA-2024:0030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0030" }, { "reference_url": "https://usn.ubuntu.com/6562-1/", "reference_id": "USN-6562-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6562-1/" }, { "reference_url": "https://usn.ubuntu.com/6563-1/", "reference_id": "USN-6563-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6563-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-6861" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51419?format=api", "vulnerability_id": "VCID-zjn8-79ab-tqd3", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5726", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38476", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38764", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38776", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38739", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38712", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38758", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38657", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.385", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38774", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38703", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00173", "scoring_system": "epss", "scoring_elements": "0.38753", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5726" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245901", "reference_id": "2245901", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245901" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846205", "reference_id": "show_bug.cgi?id=1846205", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846205" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5726" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zjn8-79ab-tqd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51418?format=api", "vulnerability_id": "VCID-zqpe-9hvc-vkbp", "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5725.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5725.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5725", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54465", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00313", "scoring_system": "epss", "scoring_elements": "0.54425", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.6168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.6169", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61596", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61649", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61625", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61644", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61659", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61695", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00415", "scoring_system": "epss", "scoring_elements": "0.61691", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245900", "reference_id": "2245900", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245900" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5535", "reference_id": "dsa-5535", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5535" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5538", "reference_id": "dsa-5538", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5538" }, { "reference_url": "https://security.gentoo.org/glsa/202402-25", "reference_id": "GLSA-202402-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202402-25" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-45" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-45/", "reference_id": "mfsa2023-45", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-45/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-46" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-46/", "reference_id": "mfsa2023-46", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-46/" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-47" }, { "reference_url": "https://www.mozilla.org/security/advisories/mfsa2023-47/", "reference_id": "mfsa2023-47", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://www.mozilla.org/security/advisories/mfsa2023-47/" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html", "reference_id": "msg00037.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6162", "reference_id": "RHSA-2023:6162", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6162" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6185", "reference_id": "RHSA-2023:6185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6186", "reference_id": "RHSA-2023:6186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6187", "reference_id": "RHSA-2023:6187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6188", "reference_id": "RHSA-2023:6188", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6189", "reference_id": "RHSA-2023:6189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6191", "reference_id": "RHSA-2023:6191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6194", "reference_id": "RHSA-2023:6194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6194" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6195", "reference_id": "RHSA-2023:6195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6196", "reference_id": "RHSA-2023:6196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6197", "reference_id": "RHSA-2023:6197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6198", "reference_id": "RHSA-2023:6198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6199", "reference_id": "RHSA-2023:6199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6199" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1845739", "reference_id": "show_bug.cgi?id=1845739", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/" } ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1845739" }, { "reference_url": "https://usn.ubuntu.com/6456-1/", "reference_id": "USN-6456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6456-1/" }, { "reference_url": "https://usn.ubuntu.com/6468-1/", "reference_id": "USN-6468-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6468-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/79189?format=api", "purl": "pkg:ebuild/mail-client/thunderbird-bin@115.7.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" } ], "aliases": [ "CVE-2023-5725" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zqpe-9hvc-vkbp" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@115.7.0" }