Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-client/firefox-bin@102.7.0
Typeebuild
Namespacewww-client
Namefirefox-bin
Version102.7.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version102.10.0
Latest_non_vulnerable_version137.0.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-362f-1bn1-mbg5
vulnerability_id VCID-362f-1bn1-mbg5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46882.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46882
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54379
published_at 2026-04-21T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-18T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54293
published_at 2026-04-02T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54395
published_at 2026-04-16T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54355
published_at 2026-04-13T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-12T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54394
published_at 2026-04-11T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54345
published_at 2026-04-09T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.5435
published_at 2026-04-08T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54298
published_at 2026-04-07T12:55:00Z
10
value 0.00312
scoring_system epss
scoring_elements 0.54323
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153467
reference_id 2153467
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153467
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-47
reference_id mfsa2022-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-47
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-47/
reference_id mfsa2022-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-47/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-52/
reference_id mfsa2022-52
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-52/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-53/
reference_id mfsa2022-53
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-53/
18
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
19
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
20
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
21
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
22
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
23
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
24
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
25
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
26
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
27
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
28
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
29
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
30
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
31
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
32
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
33
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1789371
reference_id show_bug.cgi?id=1789371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1789371
35
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46882
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-362f-1bn1-mbg5
1
url VCID-4rvz-3zc6-dkc1
vulnerability_id VCID-4rvz-3zc6-dkc1
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23606
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43808
published_at 2026-04-21T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43846
published_at 2026-04-02T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43872
published_at 2026-04-11T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.4384
published_at 2026-04-12T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.43822
published_at 2026-04-13T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43883
published_at 2026-04-16T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.43875
published_at 2026-04-18T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.4387
published_at 2026-04-04T12:55:00Z
8
value 0.00213
scoring_system epss
scoring_elements 0.43801
published_at 2026-04-07T12:55:00Z
9
value 0.00213
scoring_system epss
scoring_elements 0.43851
published_at 2026-04-08T12:55:00Z
10
value 0.00213
scoring_system epss
scoring_elements 0.43854
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23606
1
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764974%2C1798591%2C1799201%2C1800446%2C1801248%2C1802100%2C1803393%2C1804626%2C1804971%2C1807004
reference_id buglist.cgi?bug_id=1764974%2C1798591%2C1799201%2C1800446%2C1801248%2C1802100%2C1803393%2C1804626%2C1804971%2C1807004
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-10T17:51:07Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764974%2C1798591%2C1799201%2C1800446%2C1801248%2C1802100%2C1803393%2C1804626%2C1804971%2C1807004
2
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
4
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-10T17:51:07Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
5
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23606
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4rvz-3zc6-dkc1
2
url VCID-8v6z-1ktm-jygr
vulnerability_id VCID-8v6z-1ktm-jygr
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23602.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23602.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23602
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33324
published_at 2026-04-21T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33374
published_at 2026-04-08T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33411
published_at 2026-04-11T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33408
published_at 2026-04-09T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33487
published_at 2026-04-04T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33328
published_at 2026-04-07T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-02T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.33358
published_at 2026-04-18T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33382
published_at 2026-04-16T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33347
published_at 2026-04-13T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.3337
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23602
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162341
reference_id 2162341
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162341
24
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
25
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
27
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:16:34Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
29
reference_url https://www.mozilla.org/security/advisories/mfsa2023-02/
reference_id mfsa2023-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:16:34Z/
url https://www.mozilla.org/security/advisories/mfsa2023-02/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
31
reference_url https://www.mozilla.org/security/advisories/mfsa2023-03/
reference_id mfsa2023-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:16:34Z/
url https://www.mozilla.org/security/advisories/mfsa2023-03/
32
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
33
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
34
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
35
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
36
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
37
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
38
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
39
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
40
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
41
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
42
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
43
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
44
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
45
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
46
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
47
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
48
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1800890
reference_id show_bug.cgi?id=1800890
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:16:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1800890
49
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
50
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23602
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8v6z-1ktm-jygr
3
url VCID-9ym2-agp7-budj
vulnerability_id VCID-9ym2-agp7-budj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23601.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23601
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29435
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29546
published_at 2026-04-08T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29584
published_at 2026-04-09T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29587
published_at 2026-04-11T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29542
published_at 2026-04-12T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29489
published_at 2026-04-13T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29508
published_at 2026-04-16T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.2948
published_at 2026-04-18T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29613
published_at 2026-04-02T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29663
published_at 2026-04-04T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29484
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162340
reference_id 2162340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162340
23
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
24
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
26
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:17:52Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
28
reference_url https://www.mozilla.org/security/advisories/mfsa2023-02/
reference_id mfsa2023-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:17:52Z/
url https://www.mozilla.org/security/advisories/mfsa2023-02/
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
30
reference_url https://www.mozilla.org/security/advisories/mfsa2023-03/
reference_id mfsa2023-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:17:52Z/
url https://www.mozilla.org/security/advisories/mfsa2023-03/
31
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
32
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
33
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
34
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
35
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
36
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
37
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
38
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
39
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
40
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
41
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
42
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
43
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
44
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
45
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
46
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
47
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1794268
reference_id show_bug.cgi?id=1794268
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:17:52Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1794268
48
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
49
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23601
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ym2-agp7-budj
4
url VCID-ag97-q79a-xbgb
vulnerability_id VCID-ag97-q79a-xbgb
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23605.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23605.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23605
reference_id
reference_type
scores
0
value 0.0019
scoring_system epss
scoring_elements 0.40787
published_at 2026-04-21T12:55:00Z
1
value 0.0019
scoring_system epss
scoring_elements 0.40835
published_at 2026-04-07T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40891
published_at 2026-04-09T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40908
published_at 2026-04-04T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40884
published_at 2026-04-08T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.4088
published_at 2026-04-02T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40866
published_at 2026-04-18T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40896
published_at 2026-04-16T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40853
published_at 2026-04-13T12:55:00Z
9
value 0.0019
scoring_system epss
scoring_elements 0.40872
published_at 2026-04-12T12:55:00Z
10
value 0.0019
scoring_system epss
scoring_elements 0.40907
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23605
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162344
reference_id 2162344
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162344
23
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764921%2C1802690%2C1806974
reference_id buglist.cgi?bug_id=1764921%2C1802690%2C1806974
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-10T18:00:40Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764921%2C1802690%2C1806974
24
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
25
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
27
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-10T18:00:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
29
reference_url https://www.mozilla.org/security/advisories/mfsa2023-02/
reference_id mfsa2023-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-10T18:00:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-02/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
31
reference_url https://www.mozilla.org/security/advisories/mfsa2023-03/
reference_id mfsa2023-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-10T18:00:40Z/
url https://www.mozilla.org/security/advisories/mfsa2023-03/
32
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
33
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
34
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
35
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
36
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
37
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
38
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
39
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
40
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
41
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
42
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
43
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
44
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
45
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
46
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
47
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
48
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
49
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23605
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ag97-q79a-xbgb
5
url VCID-aquh-9cjg-wyey
vulnerability_id VCID-aquh-9cjg-wyey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46877.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46877.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46877
reference_id
reference_type
scores
0
value 0.00483
scoring_system epss
scoring_elements 0.65278
published_at 2026-04-18T12:55:00Z
1
value 0.00483
scoring_system epss
scoring_elements 0.65268
published_at 2026-04-16T12:55:00Z
2
value 0.00483
scoring_system epss
scoring_elements 0.65202
published_at 2026-04-02T12:55:00Z
3
value 0.00483
scoring_system epss
scoring_elements 0.65233
published_at 2026-04-13T12:55:00Z
4
value 0.00483
scoring_system epss
scoring_elements 0.65261
published_at 2026-04-21T12:55:00Z
5
value 0.00483
scoring_system epss
scoring_elements 0.65227
published_at 2026-04-04T12:55:00Z
6
value 0.00483
scoring_system epss
scoring_elements 0.65273
published_at 2026-04-11T12:55:00Z
7
value 0.00483
scoring_system epss
scoring_elements 0.65255
published_at 2026-04-09T12:55:00Z
8
value 0.00483
scoring_system epss
scoring_elements 0.65243
published_at 2026-04-08T12:55:00Z
9
value 0.00483
scoring_system epss
scoring_elements 0.65193
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46877
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162342
reference_id 2162342
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162342
23
reference_url https://www.debian.org/security/2023/dsa-5322
reference_id dsa-5322
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://www.debian.org/security/2023/dsa-5322
24
reference_url https://www.debian.org/security/2023/dsa-5355
reference_id dsa-5355
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://www.debian.org/security/2023/dsa-5355
25
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://security.gentoo.org/glsa/202305-06
26
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://security.gentoo.org/glsa/202305-13
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
28
reference_url https://www.mozilla.org/security/advisories/mfsa2022-51/
reference_id mfsa2022-51
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://www.mozilla.org/security/advisories/mfsa2022-51/
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
31
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
32
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
33
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
34
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
35
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
36
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
37
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
38
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
39
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
40
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
41
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
42
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
43
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
44
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
45
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
46
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
47
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
48
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
49
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1795139
reference_id show_bug.cgi?id=1795139
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1795139
50
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
51
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46877
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aquh-9cjg-wyey
6
url VCID-c52k-tg8d-sbeg
vulnerability_id VCID-c52k-tg8d-sbeg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23599.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23599
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34371
published_at 2026-04-21T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34422
published_at 2026-04-08T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34451
published_at 2026-04-09T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34453
published_at 2026-04-11T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34414
published_at 2026-04-12T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.3439
published_at 2026-04-13T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34425
published_at 2026-04-16T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34412
published_at 2026-04-18T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34484
published_at 2026-04-02T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34512
published_at 2026-04-04T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34379
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23599
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162339
reference_id 2162339
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162339
3
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
4
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
6
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
8
reference_url https://www.mozilla.org/security/advisories/mfsa2023-02/
reference_id mfsa2023-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/
url https://www.mozilla.org/security/advisories/mfsa2023-02/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
10
reference_url https://www.mozilla.org/security/advisories/mfsa2023-03/
reference_id mfsa2023-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/
url https://www.mozilla.org/security/advisories/mfsa2023-03/
11
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
12
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
13
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
14
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
15
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
16
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
17
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
18
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
19
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
20
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
21
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
22
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
23
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
24
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
25
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
26
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
27
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1777800
reference_id show_bug.cgi?id=1777800
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:21:01Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1777800
28
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
29
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23599
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c52k-tg8d-sbeg
7
url VCID-cejz-671b-wyga
vulnerability_id VCID-cejz-671b-wyga
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23604
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10861
published_at 2026-04-11T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10823
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10681
published_at 2026-04-18T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10666
published_at 2026-04-16T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10806
published_at 2026-04-13T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.1083
published_at 2026-04-12T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10888
published_at 2026-04-04T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10716
published_at 2026-04-07T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10792
published_at 2026-04-08T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10848
published_at 2026-04-09T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14622
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23604
1
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
3
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:06:20Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1802346
reference_id show_bug.cgi?id=1802346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:06:20Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1802346
5
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23604
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cejz-671b-wyga
8
url VCID-daaa-zra4-w7hz
vulnerability_id VCID-daaa-zra4-w7hz
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23600
reference_id
reference_type
scores
0
value 0.0025
scoring_system epss
scoring_elements 0.4824
published_at 2026-04-21T12:55:00Z
1
value 0.0025
scoring_system epss
scoring_elements 0.48209
published_at 2026-04-02T12:55:00Z
2
value 0.0025
scoring_system epss
scoring_elements 0.48239
published_at 2026-04-13T12:55:00Z
3
value 0.0025
scoring_system epss
scoring_elements 0.48291
published_at 2026-04-16T12:55:00Z
4
value 0.0025
scoring_system epss
scoring_elements 0.48285
published_at 2026-04-18T12:55:00Z
5
value 0.0025
scoring_system epss
scoring_elements 0.48229
published_at 2026-04-09T12:55:00Z
6
value 0.0025
scoring_system epss
scoring_elements 0.4818
published_at 2026-04-07T12:55:00Z
7
value 0.0025
scoring_system epss
scoring_elements 0.48235
published_at 2026-04-08T12:55:00Z
8
value 0.0025
scoring_system epss
scoring_elements 0.48254
published_at 2026-04-11T12:55:00Z
9
value 0.0025
scoring_system epss
scoring_elements 0.48228
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23600
1
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
3
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:19:41Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1787034
reference_id show_bug.cgi?id=1787034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:19:41Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1787034
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23600
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-daaa-zra4-w7hz
9
url VCID-e4nx-qfam-cfaj
vulnerability_id VCID-e4nx-qfam-cfaj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54744
published_at 2026-04-18T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54742
published_at 2026-04-16T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54725
published_at 2026-04-21T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54704
published_at 2026-04-13T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54689
published_at 2026-04-02T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54711
published_at 2026-04-04T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54681
published_at 2026-04-07T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54733
published_at 2026-04-08T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54729
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
reference_id 2153441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46872
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e4nx-qfam-cfaj
10
url VCID-fxnj-rr7h-ryb5
vulnerability_id VCID-fxnj-rr7h-ryb5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46880.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46880
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-13T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39418
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39402
published_at 2026-04-02T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39426
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.3934
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39396
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39413
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39423
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39384
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46880
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153463
reference_id 2153463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153463
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-40
reference_id mfsa2022-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-40
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46880
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxnj-rr7h-ryb5
11
url VCID-hp32-swmr-qqdy
vulnerability_id VCID-hp32-swmr-qqdy
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.5765
published_at 2026-04-21T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57646
published_at 2026-04-13T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57676
published_at 2026-04-16T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57671
published_at 2026-04-18T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57617
published_at 2026-04-02T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57638
published_at 2026-04-04T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57614
published_at 2026-04-07T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57668
published_at 2026-04-08T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57673
published_at 2026-04-09T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57687
published_at 2026-04-11T12:55:00Z
10
value 0.00352
scoring_system epss
scoring_elements 0.57666
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
reference_id 2153454
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46878
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp32-swmr-qqdy
12
url VCID-j623-3wjy-57c2
vulnerability_id VCID-j623-3wjy-57c2
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23597
reference_id
reference_type
scores
0
value 0.001
scoring_system epss
scoring_elements 0.27618
published_at 2026-04-21T12:55:00Z
1
value 0.001
scoring_system epss
scoring_elements 0.27828
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27674
published_at 2026-04-13T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27683
published_at 2026-04-16T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27656
published_at 2026-04-18T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27868
published_at 2026-04-04T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27659
published_at 2026-04-07T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27727
published_at 2026-04-08T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27771
published_at 2026-04-09T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27776
published_at 2026-04-11T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27733
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23597
1
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
3
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:23:26Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1538028
reference_id show_bug.cgi?id=1538028
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:23:26Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1538028
5
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23597
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j623-3wjy-57c2
13
url VCID-kfxp-azcd-2yej
vulnerability_id VCID-kfxp-azcd-2yej
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46871.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46871
reference_id
reference_type
scores
0
value 0.00931
scoring_system epss
scoring_elements 0.76137
published_at 2026-04-21T12:55:00Z
1
value 0.00931
scoring_system epss
scoring_elements 0.76154
published_at 2026-04-18T12:55:00Z
2
value 0.00931
scoring_system epss
scoring_elements 0.76083
published_at 2026-04-04T12:55:00Z
3
value 0.00931
scoring_system epss
scoring_elements 0.76112
published_at 2026-04-12T12:55:00Z
4
value 0.00931
scoring_system epss
scoring_elements 0.76136
published_at 2026-04-11T12:55:00Z
5
value 0.00931
scoring_system epss
scoring_elements 0.76111
published_at 2026-04-09T12:55:00Z
6
value 0.00931
scoring_system epss
scoring_elements 0.76097
published_at 2026-04-08T12:55:00Z
7
value 0.00931
scoring_system epss
scoring_elements 0.76064
published_at 2026-04-07T12:55:00Z
8
value 0.00931
scoring_system epss
scoring_elements 0.76051
published_at 2026-04-02T12:55:00Z
9
value 0.00931
scoring_system epss
scoring_elements 0.7615
published_at 2026-04-16T12:55:00Z
10
value 0.00931
scoring_system epss
scoring_elements 0.7611
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162336
reference_id 2162336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162336
24
reference_url https://www.debian.org/security/2023/dsa-5322
reference_id dsa-5322
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://www.debian.org/security/2023/dsa-5322
25
reference_url https://www.debian.org/security/2023/dsa-5355
reference_id dsa-5355
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://www.debian.org/security/2023/dsa-5355
26
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://security.gentoo.org/glsa/202305-06
27
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://security.gentoo.org/glsa/202305-13
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
29
reference_url https://www.mozilla.org/security/advisories/mfsa2022-51/
reference_id mfsa2022-51
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-51/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
31
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
32
reference_url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html
33
reference_url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html
34
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
35
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
36
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
37
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
38
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
39
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
40
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
41
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
42
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
43
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
44
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
45
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
46
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
47
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
48
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
49
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
50
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1795697
reference_id show_bug.cgi?id=1795697
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1795697
51
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
52
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46871
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfxp-azcd-2yej
14
url VCID-q494-zvyn-quge
vulnerability_id VCID-q494-zvyn-quge
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46881.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46881
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47322
published_at 2026-04-21T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.4732
published_at 2026-04-13T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-16T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47372
published_at 2026-04-18T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47296
published_at 2026-04-02T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47316
published_at 2026-04-04T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47263
published_at 2026-04-07T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47318
published_at 2026-04-08T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.47315
published_at 2026-04-09T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47339
published_at 2026-04-11T12:55:00Z
10
value 0.0024
scoring_system epss
scoring_elements 0.47313
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46881
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153466
reference_id 2153466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153466
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-44
reference_id mfsa2022-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-44
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46881
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q494-zvyn-quge
15
url VCID-r9rc-27rr-13h6
vulnerability_id VCID-r9rc-27rr-13h6
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46879
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-21T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67226
published_at 2026-04-02T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.6725
published_at 2026-04-04T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67227
published_at 2026-04-07T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67278
published_at 2026-04-08T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67291
published_at 2026-04-09T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.67311
published_at 2026-04-11T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67298
published_at 2026-04-16T12:55:00Z
8
value 0.00531
scoring_system epss
scoring_elements 0.67263
published_at 2026-04-13T12:55:00Z
9
value 0.00531
scoring_system epss
scoring_elements 0.6731
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46879
1
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
3
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46879
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r9rc-27rr-13h6
16
url VCID-su89-u51g-z3hs
vulnerability_id VCID-su89-u51g-z3hs
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23598.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23598.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23598
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.40946
published_at 2026-04-21T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.40987
published_at 2026-04-07T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41036
published_at 2026-04-08T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.41043
published_at 2026-04-09T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.41061
published_at 2026-04-11T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.41026
published_at 2026-04-12T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.4101
published_at 2026-04-13T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.41052
published_at 2026-04-16T12:55:00Z
8
value 0.00191
scoring_system epss
scoring_elements 0.41023
published_at 2026-04-18T12:55:00Z
9
value 0.00191
scoring_system epss
scoring_elements 0.41028
published_at 2026-04-02T12:55:00Z
10
value 0.00191
scoring_system epss
scoring_elements 0.4106
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23598
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162338
reference_id 2162338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162338
24
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
25
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
27
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:22:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
29
reference_url https://www.mozilla.org/security/advisories/mfsa2023-02/
reference_id mfsa2023-02
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:22:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-02/
30
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
31
reference_url https://www.mozilla.org/security/advisories/mfsa2023-03/
reference_id mfsa2023-03
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:22:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-03/
32
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
33
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
34
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
35
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
36
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
37
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
38
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
39
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
40
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
41
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
42
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
43
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
44
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
45
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
46
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
47
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
48
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1800425
reference_id show_bug.cgi?id=1800425
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-09T16:22:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1800425
49
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
50
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23598
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-su89-u51g-z3hs
17
url VCID-tf6z-7brv-dybw
vulnerability_id VCID-tf6z-7brv-dybw
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46873
reference_id
reference_type
scores
0
value 0.00596
scoring_system epss
scoring_elements 0.69356
published_at 2026-04-21T12:55:00Z
1
value 0.00596
scoring_system epss
scoring_elements 0.69285
published_at 2026-04-02T12:55:00Z
2
value 0.00596
scoring_system epss
scoring_elements 0.69302
published_at 2026-04-04T12:55:00Z
3
value 0.00596
scoring_system epss
scoring_elements 0.69282
published_at 2026-04-07T12:55:00Z
4
value 0.00596
scoring_system epss
scoring_elements 0.69332
published_at 2026-04-08T12:55:00Z
5
value 0.00596
scoring_system epss
scoring_elements 0.69349
published_at 2026-04-09T12:55:00Z
6
value 0.00596
scoring_system epss
scoring_elements 0.69371
published_at 2026-04-11T12:55:00Z
7
value 0.00596
scoring_system epss
scoring_elements 0.69355
published_at 2026-04-12T12:55:00Z
8
value 0.00596
scoring_system epss
scoring_elements 0.69327
published_at 2026-04-13T12:55:00Z
9
value 0.00596
scoring_system epss
scoring_elements 0.69365
published_at 2026-04-16T12:55:00Z
10
value 0.00596
scoring_system epss
scoring_elements 0.69375
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46873
1
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
3
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46873
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tf6z-7brv-dybw
18
url VCID-v9ua-1tey-cyaa
vulnerability_id VCID-v9ua-1tey-cyaa
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46875.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46875
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34404
published_at 2026-04-21T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34442
published_at 2026-04-18T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34517
published_at 2026-04-02T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34457
published_at 2026-04-16T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34422
published_at 2026-04-13T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.34446
published_at 2026-04-12T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34485
published_at 2026-04-11T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34483
published_at 2026-04-09T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34454
published_at 2026-04-08T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34412
published_at 2026-04-07T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34545
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46875
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153451
reference_id 2153451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153451
3
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://security.gentoo.org/glsa/202305-06
4
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://security.gentoo.org/glsa/202305-13
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
6
reference_url https://www.mozilla.org/security/advisories/mfsa2022-51/
reference_id mfsa2022-51
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2022-51/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
8
reference_url https://www.mozilla.org/security/advisories/mfsa2022-52/
reference_id mfsa2022-52
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2022-52/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
10
reference_url https://www.mozilla.org/security/advisories/mfsa2022-53/
reference_id mfsa2022-53
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2022-53/
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
reference_id show_bug.cgi?id=1786188
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46875
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9ua-1tey-cyaa
19
url VCID-yxdd-fgbw-rug1
vulnerability_id VCID-yxdd-fgbw-rug1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23603.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23603
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.38277
published_at 2026-04-21T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38302
published_at 2026-04-07T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.3836
published_at 2026-04-09T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38438
published_at 2026-04-04T12:55:00Z
4
value 0.00171
scoring_system epss
scoring_elements 0.38352
published_at 2026-04-08T12:55:00Z
5
value 0.00171
scoring_system epss
scoring_elements 0.38414
published_at 2026-04-02T12:55:00Z
6
value 0.00171
scoring_system epss
scoring_elements 0.38342
published_at 2026-04-18T12:55:00Z
7
value 0.00171
scoring_system epss
scoring_elements 0.38363
published_at 2026-04-16T12:55:00Z
8
value 0.00171
scoring_system epss
scoring_elements 0.38315
published_at 2026-04-13T12:55:00Z
9
value 0.00171
scoring_system epss
scoring_elements 0.3834
published_at 2026-04-12T12:55:00Z
10
value 0.00171
scoring_system epss
scoring_elements 0.38377
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23603
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162343
reference_id 2162343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162343
23
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
24
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
25
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
reference_id mfsa2023-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-01
26
reference_url https://www.mozilla.org/security/advisories/mfsa2023-01/
reference_id mfsa2023-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:09:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-01/
27
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
reference_id mfsa2023-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-02
28
reference_url https://www.mozilla.org/security/advisories/mfsa2023-02/
reference_id mfsa2023-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:09:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-02/
29
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
reference_id mfsa2023-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-03
30
reference_url https://www.mozilla.org/security/advisories/mfsa2023-03/
reference_id mfsa2023-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:09:19Z/
url https://www.mozilla.org/security/advisories/mfsa2023-03/
31
reference_url https://access.redhat.com/errata/RHSA-2023:0285
reference_id RHSA-2023:0285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0285
32
reference_url https://access.redhat.com/errata/RHSA-2023:0286
reference_id RHSA-2023:0286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0286
33
reference_url https://access.redhat.com/errata/RHSA-2023:0288
reference_id RHSA-2023:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0288
34
reference_url https://access.redhat.com/errata/RHSA-2023:0289
reference_id RHSA-2023:0289
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0289
35
reference_url https://access.redhat.com/errata/RHSA-2023:0290
reference_id RHSA-2023:0290
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0290
36
reference_url https://access.redhat.com/errata/RHSA-2023:0294
reference_id RHSA-2023:0294
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0294
37
reference_url https://access.redhat.com/errata/RHSA-2023:0295
reference_id RHSA-2023:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0295
38
reference_url https://access.redhat.com/errata/RHSA-2023:0296
reference_id RHSA-2023:0296
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0296
39
reference_url https://access.redhat.com/errata/RHSA-2023:0456
reference_id RHSA-2023:0456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0456
40
reference_url https://access.redhat.com/errata/RHSA-2023:0457
reference_id RHSA-2023:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0457
41
reference_url https://access.redhat.com/errata/RHSA-2023:0459
reference_id RHSA-2023:0459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0459
42
reference_url https://access.redhat.com/errata/RHSA-2023:0460
reference_id RHSA-2023:0460
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0460
43
reference_url https://access.redhat.com/errata/RHSA-2023:0461
reference_id RHSA-2023:0461
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0461
44
reference_url https://access.redhat.com/errata/RHSA-2023:0462
reference_id RHSA-2023:0462
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0462
45
reference_url https://access.redhat.com/errata/RHSA-2023:0463
reference_id RHSA-2023:0463
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0463
46
reference_url https://access.redhat.com/errata/RHSA-2023:0476
reference_id RHSA-2023:0476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0476
47
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1800832
reference_id show_bug.cgi?id=1800832
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-10T18:09:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1800832
48
reference_url https://usn.ubuntu.com/5816-1/
reference_id USN-5816-1
reference_type
scores
url https://usn.ubuntu.com/5816-1/
49
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2023-23603
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxdd-fgbw-rug1
20
url VCID-yxy6-s185-myc9
vulnerability_id VCID-yxy6-s185-myc9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59387
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59366
published_at 2026-04-13T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-16T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59405
published_at 2026-04-18T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.5933
published_at 2026-04-02T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59353
published_at 2026-04-04T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59318
published_at 2026-04-07T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59368
published_at 2026-04-08T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-09T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59401
published_at 2026-04-11T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
reference_id 2153449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
reference_id mfsa2022-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:ebuild/www-client/firefox-bin@102.7.0
purl pkg:ebuild/www-client/firefox-bin@102.7.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0
1
url pkg:ebuild/www-client/firefox-bin@109.0
purl pkg:ebuild/www-client/firefox-bin@109.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@109.0
aliases CVE-2022-46874
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxy6-s185-myc9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@102.7.0