Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@128.3.1-1?arch=el8_8
Typerpm
Namespaceredhat
Namethunderbird
Version128.3.1-1
Qualifiers
arch el8_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1z5d-4wfm-8yfk
vulnerability_id VCID-1z5d-4wfm-8yfk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.3928
published_at 2026-04-24T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39475
published_at 2026-04-21T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39559
published_at 2026-04-18T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39574
published_at 2026-04-02T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39567
published_at 2026-04-08T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39513
published_at 2026-04-07T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39597
published_at 2026-04-04T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39589
published_at 2026-04-16T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-13T12:55:00Z
9
value 0.00179
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-12T12:55:00Z
10
value 0.00179
scoring_system epss
scoring_elements 0.39593
published_at 2026-04-11T12:55:00Z
11
value 0.00179
scoring_system epss
scoring_elements 0.39583
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
reference_id 2315954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
reference_id show_bug.cgi?id=1912471
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9396
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z5d-4wfm-8yfk
1
url VCID-2j6k-5q8j-3fbc
vulnerability_id VCID-2j6k-5q8j-3fbc
summary Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9680.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9680.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9680
reference_id
reference_type
scores
0
value 0.30808
scoring_system epss
scoring_elements 0.9674
published_at 2026-04-24T12:55:00Z
1
value 0.30808
scoring_system epss
scoring_elements 0.96714
published_at 2026-04-07T12:55:00Z
2
value 0.30808
scoring_system epss
scoring_elements 0.96728
published_at 2026-04-13T12:55:00Z
3
value 0.30808
scoring_system epss
scoring_elements 0.96725
published_at 2026-04-12T12:55:00Z
4
value 0.30808
scoring_system epss
scoring_elements 0.96723
published_at 2026-04-09T12:55:00Z
5
value 0.30808
scoring_system epss
scoring_elements 0.96722
published_at 2026-04-08T12:55:00Z
6
value 0.30808
scoring_system epss
scoring_elements 0.96741
published_at 2026-04-21T12:55:00Z
7
value 0.30808
scoring_system epss
scoring_elements 0.96738
published_at 2026-04-18T12:55:00Z
8
value 0.30808
scoring_system epss
scoring_elements 0.96734
published_at 2026-04-16T12:55:00Z
9
value 0.31347
scoring_system epss
scoring_elements 0.96757
published_at 2026-04-04T12:55:00Z
10
value 0.31347
scoring_system epss
scoring_elements 0.96755
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9680
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1084989
reference_id 1084989
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1084989
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2317442
reference_id 2317442
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2317442
6
reference_url https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039
reference_id CVE-2024-49039
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-16T12:58:45Z/
url https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-49039
7
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-51
reference_id mfsa2024-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-51
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-51/
reference_id mfsa2024-51
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-16T12:58:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-51/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-52
reference_id mfsa2024-52
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-52
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-52/
reference_id mfsa2024-52
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-16T12:58:45Z/
url https://www.mozilla.org/security/advisories/mfsa2024-52/
12
reference_url https://access.redhat.com/errata/RHSA-2024:7958
reference_id RHSA-2024:7958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7958
13
reference_url https://access.redhat.com/errata/RHSA-2024:7977
reference_id RHSA-2024:7977
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7977
14
reference_url https://access.redhat.com/errata/RHSA-2024:8024
reference_id RHSA-2024:8024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8024
15
reference_url https://access.redhat.com/errata/RHSA-2024:8025
reference_id RHSA-2024:8025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8025
16
reference_url https://access.redhat.com/errata/RHSA-2024:8026
reference_id RHSA-2024:8026
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8026
17
reference_url https://access.redhat.com/errata/RHSA-2024:8027
reference_id RHSA-2024:8027
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8027
18
reference_url https://access.redhat.com/errata/RHSA-2024:8028
reference_id RHSA-2024:8028
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8028
19
reference_url https://access.redhat.com/errata/RHSA-2024:8029
reference_id RHSA-2024:8029
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8029
20
reference_url https://access.redhat.com/errata/RHSA-2024:8030
reference_id RHSA-2024:8030
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8030
21
reference_url https://access.redhat.com/errata/RHSA-2024:8031
reference_id RHSA-2024:8031
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8031
22
reference_url https://access.redhat.com/errata/RHSA-2024:8032
reference_id RHSA-2024:8032
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8032
23
reference_url https://access.redhat.com/errata/RHSA-2024:8033
reference_id RHSA-2024:8033
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8033
24
reference_url https://access.redhat.com/errata/RHSA-2024:8034
reference_id RHSA-2024:8034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8034
25
reference_url https://access.redhat.com/errata/RHSA-2024:8131
reference_id RHSA-2024:8131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8131
26
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
27
reference_url https://access.redhat.com/errata/RHSA-2024:8167
reference_id RHSA-2024:8167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8167
28
reference_url https://access.redhat.com/errata/RHSA-2024:8176
reference_id RHSA-2024:8176
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8176
29
reference_url https://access.redhat.com/errata/RHSA-2024:9552
reference_id RHSA-2024:9552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9552
30
reference_url https://access.redhat.com/errata/RHSA-2024:9554
reference_id RHSA-2024:9554
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9554
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1923344
reference_id show_bug.cgi?id=1923344
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2024-10-16T12:58:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1923344
32
reference_url https://usn.ubuntu.com/7065-1/
reference_id USN-7065-1
reference_type
scores
url https://usn.ubuntu.com/7065-1/
33
reference_url https://usn.ubuntu.com/7066-1/
reference_id USN-7066-1
reference_type
scores
url https://usn.ubuntu.com/7066-1/
fixed_packages
aliases CVE-2024-9680
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2j6k-5q8j-3fbc
2
url VCID-7wvh-upas-2bgh
vulnerability_id VCID-7wvh-upas-2bgh
summary An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://devtools` origin. This could allow them to access cross-origin JSON content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9394.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9394
reference_id
reference_type
scores
0
value 0.00162
scoring_system epss
scoring_elements 0.36851
published_at 2026-04-24T12:55:00Z
1
value 0.00162
scoring_system epss
scoring_elements 0.37076
published_at 2026-04-21T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39153
published_at 2026-04-02T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39145
published_at 2026-04-18T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39175
published_at 2026-04-16T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39148
published_at 2026-04-08T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39094
published_at 2026-04-07T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39174
published_at 2026-04-04T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39121
published_at 2026-04-13T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.3914
published_at 2026-04-12T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39177
published_at 2026-04-11T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.39165
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315957
reference_id 2315957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315957
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
6
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
16
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
17
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
18
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
19
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
20
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
21
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
22
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
23
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
24
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
25
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
26
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
27
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
28
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
29
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
30
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
31
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
32
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1918874
reference_id show_bug.cgi?id=1918874
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1918874
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9394
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wvh-upas-2bgh
3
url VCID-9caj-c15z-xuf5
vulnerability_id VCID-9caj-c15z-xuf5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28113
published_at 2026-04-24T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28242
published_at 2026-04-07T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28308
published_at 2026-04-08T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28351
published_at 2026-04-09T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28355
published_at 2026-04-11T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28312
published_at 2026-04-12T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28254
published_at 2026-04-13T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28266
published_at 2026-04-16T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28247
published_at 2026-04-18T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.282
published_at 2026-04-21T12:55:00Z
10
value 0.00103
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-02T12:55:00Z
11
value 0.00103
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
reference_id 2315947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
11
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
12
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
13
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
14
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
15
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
16
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
17
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
18
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
19
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
20
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
21
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
22
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
23
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
24
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
25
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
reference_id show_bug.cgi?id=1917807
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
27
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
28
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9403
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9caj-c15z-xuf5
4
url VCID-bsnh-1chq-z7ae
vulnerability_id VCID-bsnh-1chq-z7ae
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33436
published_at 2026-04-24T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.338
published_at 2026-04-21T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33846
published_at 2026-04-16T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33808
published_at 2026-04-13T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33832
published_at 2026-04-18T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33874
published_at 2026-04-11T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33876
published_at 2026-04-09T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33917
published_at 2026-04-02T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33844
published_at 2026-04-08T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33802
published_at 2026-04-07T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33949
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
reference_id 2315953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
reference_id show_bug.cgi?id=1915249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsnh-1chq-z7ae
5
url VCID-jebk-6hja-ukfc
vulnerability_id VCID-jebk-6hja-ukfc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31564
published_at 2026-04-24T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31734
published_at 2026-04-21T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31764
published_at 2026-04-18T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31785
published_at 2026-04-16T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31753
published_at 2026-04-13T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31789
published_at 2026-04-12T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31829
published_at 2026-04-11T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31883
published_at 2026-04-02T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31796
published_at 2026-04-08T12:55:00Z
9
value 0.00125
scoring_system epss
scoring_elements 0.31745
published_at 2026-04-07T12:55:00Z
10
value 0.00125
scoring_system epss
scoring_elements 0.31926
published_at 2026-04-04T12:55:00Z
11
value 0.00125
scoring_system epss
scoring_elements 0.31826
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
reference_id 2315951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
16
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
17
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
18
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
19
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
20
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
21
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
22
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
23
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
24
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
25
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
26
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
27
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
28
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
29
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
30
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
31
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
32
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9402
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jebk-6hja-ukfc
6
url VCID-k3ec-bt9r-pkhg
vulnerability_id VCID-k3ec-bt9r-pkhg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44352
published_at 2026-04-24T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44433
published_at 2026-04-21T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44502
published_at 2026-04-18T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44511
published_at 2026-04-16T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44456
published_at 2026-04-12T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44486
published_at 2026-04-11T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.4447
published_at 2026-04-09T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44455
published_at 2026-04-13T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44463
published_at 2026-04-08T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44412
published_at 2026-04-07T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44476
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
reference_id 2315949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
reference_id show_bug.cgi?id=1916659
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9397
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ec-bt9r-pkhg
7
url VCID-ka9e-ps8e-ryc8
vulnerability_id VCID-ka9e-ps8e-ryc8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
reference_id
reference_type
scores
0
value 0.00135
scoring_system epss
scoring_elements 0.33057
published_at 2026-04-24T12:55:00Z
1
value 0.00135
scoring_system epss
scoring_elements 0.33203
published_at 2026-04-21T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.3521
published_at 2026-04-04T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.3513
published_at 2026-04-18T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35144
published_at 2026-04-16T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35162
published_at 2026-04-09T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35136
published_at 2026-04-08T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.35091
published_at 2026-04-07T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35181
published_at 2026-04-02T12:55:00Z
9
value 0.00147
scoring_system epss
scoring_elements 0.35106
published_at 2026-04-13T12:55:00Z
10
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-12T12:55:00Z
11
value 0.00147
scoring_system epss
scoring_elements 0.35166
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
reference_id 2315959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
18
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
19
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
20
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
21
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
22
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
23
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
24
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
25
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
26
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
27
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
28
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
29
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
30
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
31
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
32
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
33
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
34
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
reference_id show_bug.cgi?id=1899154
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
reference_id show_bug.cgi?id=1905843
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
37
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9392
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka9e-ps8e-ryc8
8
url VCID-kpun-mgtm-5uhd
vulnerability_id VCID-kpun-mgtm-5uhd
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49361
published_at 2026-04-21T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49391
published_at 2026-04-18T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49395
published_at 2026-04-16T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.49321
published_at 2026-04-02T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49358
published_at 2026-04-08T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-07T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49349
published_at 2026-04-04T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49347
published_at 2026-04-24T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49345
published_at 2026-04-12T12:55:00Z
9
value 0.0026
scoring_system epss
scoring_elements 0.49371
published_at 2026-04-11T12:55:00Z
10
value 0.0026
scoring_system epss
scoring_elements 0.49353
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
reference_id 2315945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
reference_id show_bug.cgi?id=1907726
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9399
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpun-mgtm-5uhd
9
url VCID-kx3j-abfc-qfh2
vulnerability_id VCID-kx3j-abfc-qfh2
summary An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin. This could allow them to access cross-origin PDF content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9393.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9393
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37722
published_at 2026-04-24T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37935
published_at 2026-04-21T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40039
published_at 2026-04-02T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40028
published_at 2026-04-18T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40058
published_at 2026-04-16T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-08T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.39986
published_at 2026-04-07T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40065
published_at 2026-04-04T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40008
published_at 2026-04-13T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40027
published_at 2026-04-12T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.40064
published_at 2026-04-11T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.40054
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315956
reference_id 2315956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315956
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
6
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
16
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
17
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
18
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
19
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
20
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
21
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
22
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
23
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
24
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
25
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
26
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
27
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
28
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
29
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
30
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
31
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
32
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1918301
reference_id show_bug.cgi?id=1918301
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1918301
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9393
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3j-abfc-qfh2
10
url VCID-pmkt-c3bw-zkhz
vulnerability_id VCID-pmkt-c3bw-zkhz
summary By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9398.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9398
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74237
published_at 2026-04-24T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74202
published_at 2026-04-21T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.74209
published_at 2026-04-18T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74121
published_at 2026-04-02T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-08T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74119
published_at 2026-04-07T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74147
published_at 2026-04-04T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74201
published_at 2026-04-16T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74163
published_at 2026-04-13T12:55:00Z
9
value 0.00806
scoring_system epss
scoring_elements 0.7417
published_at 2026-04-12T12:55:00Z
10
value 0.00806
scoring_system epss
scoring_elements 0.74188
published_at 2026-04-11T12:55:00Z
11
value 0.00806
scoring_system epss
scoring_elements 0.74166
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9398
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315952
reference_id 2315952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315952
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
12
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
13
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
14
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
15
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
16
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
17
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
18
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
19
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
20
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
21
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
22
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
23
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
24
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
25
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
26
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
27
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1881037
reference_id show_bug.cgi?id=1881037
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1881037
29
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
30
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9398
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmkt-c3bw-zkhz
11
url VCID-z6yt-va55-s3ey
vulnerability_id VCID-z6yt-va55-s3ey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37737
published_at 2026-04-24T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.3795
published_at 2026-04-21T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40018
published_at 2026-04-13T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40037
published_at 2026-04-12T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40074
published_at 2026-04-11T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40063
published_at 2026-04-09T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-08T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40048
published_at 2026-04-02T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40038
published_at 2026-04-18T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40067
published_at 2026-04-16T12:55:00Z
10
value 0.00183
scoring_system epss
scoring_elements 0.39996
published_at 2026-04-07T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
reference_id 2315950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
6
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
7
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
19
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
20
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
21
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
22
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
23
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
24
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
25
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
26
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
27
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
28
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
29
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
30
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
31
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
32
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
33
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
34
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
35
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
36
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9401
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6yt-va55-s3ey
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@128.3.1-1%3Farch=el8_8