Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@128.3.0-1?arch=el9_2
Typerpm
Namespaceredhat
Namethunderbird
Version128.3.0-1
Qualifiers
arch el9_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1z5d-4wfm-8yfk
vulnerability_id VCID-1z5d-4wfm-8yfk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9396.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
reference_id
reference_type
scores
0
value 0.00179
scoring_system epss
scoring_elements 0.39589
published_at 2026-04-16T12:55:00Z
1
value 0.00179
scoring_system epss
scoring_elements 0.39539
published_at 2026-04-13T12:55:00Z
2
value 0.00179
scoring_system epss
scoring_elements 0.39555
published_at 2026-04-12T12:55:00Z
3
value 0.00179
scoring_system epss
scoring_elements 0.39597
published_at 2026-04-04T12:55:00Z
4
value 0.00179
scoring_system epss
scoring_elements 0.39513
published_at 2026-04-07T12:55:00Z
5
value 0.00179
scoring_system epss
scoring_elements 0.39574
published_at 2026-04-02T12:55:00Z
6
value 0.00179
scoring_system epss
scoring_elements 0.39593
published_at 2026-04-11T12:55:00Z
7
value 0.00179
scoring_system epss
scoring_elements 0.39583
published_at 2026-04-09T12:55:00Z
8
value 0.00179
scoring_system epss
scoring_elements 0.39567
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9396
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
reference_id 2315954
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315954
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
reference_id show_bug.cgi?id=1912471
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:12:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1912471
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9396
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z5d-4wfm-8yfk
1
url VCID-7wvh-upas-2bgh
vulnerability_id VCID-7wvh-upas-2bgh
summary An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://devtools` origin. This could allow them to access cross-origin JSON content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9394.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9394.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9394
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.39175
published_at 2026-04-16T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39121
published_at 2026-04-13T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.3914
published_at 2026-04-12T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39177
published_at 2026-04-11T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39153
published_at 2026-04-02T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39174
published_at 2026-04-04T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39165
published_at 2026-04-09T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39094
published_at 2026-04-07T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39148
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9394
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9394
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315957
reference_id 2315957
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315957
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
6
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
16
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
17
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
18
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
19
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
20
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
21
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
22
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
23
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
24
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
25
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
26
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
27
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
28
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
29
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
30
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
31
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
32
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1918874
reference_id show_bug.cgi?id=1918874
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:04:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1918874
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9394
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7wvh-upas-2bgh
2
url VCID-9caj-c15z-xuf5
vulnerability_id VCID-9caj-c15z-xuf5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9403.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28266
published_at 2026-04-16T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-04T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28408
published_at 2026-04-02T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28242
published_at 2026-04-07T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28254
published_at 2026-04-13T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28312
published_at 2026-04-12T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28355
published_at 2026-04-11T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28351
published_at 2026-04-09T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28308
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9403
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
reference_id 2315947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315947
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
11
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
12
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
13
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
14
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
15
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
16
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
17
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
18
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
19
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
20
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
21
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
22
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
23
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
24
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
25
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
26
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
reference_id show_bug.cgi?id=1917807
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:34:25Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1917807
27
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
28
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9403
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9caj-c15z-xuf5
3
url VCID-bsnh-1chq-z7ae
vulnerability_id VCID-bsnh-1chq-z7ae
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9400.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33846
published_at 2026-04-16T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33808
published_at 2026-04-13T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33832
published_at 2026-04-12T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33874
published_at 2026-04-11T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33876
published_at 2026-04-09T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33844
published_at 2026-04-08T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33802
published_at 2026-04-07T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33917
published_at 2026-04-02T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33949
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9400
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
reference_id 2315953
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315953
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
reference_id show_bug.cgi?id=1915249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:42:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1915249
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9400
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bsnh-1chq-z7ae
4
url VCID-jebk-6hja-ukfc
vulnerability_id VCID-jebk-6hja-ukfc
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9402.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31785
published_at 2026-04-16T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31753
published_at 2026-04-13T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31789
published_at 2026-04-12T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31829
published_at 2026-04-11T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.31826
published_at 2026-04-09T12:55:00Z
5
value 0.00125
scoring_system epss
scoring_elements 0.31796
published_at 2026-04-08T12:55:00Z
6
value 0.00125
scoring_system epss
scoring_elements 0.31745
published_at 2026-04-07T12:55:00Z
7
value 0.00125
scoring_system epss
scoring_elements 0.31883
published_at 2026-04-02T12:55:00Z
8
value 0.00125
scoring_system epss
scoring_elements 0.31926
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9402
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
reference_id 2315951
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315951
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:36:13Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
16
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
17
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
18
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
19
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
20
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
21
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
22
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
23
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
24
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
25
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
26
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
27
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
28
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
29
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
30
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
31
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
32
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
34
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9402
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jebk-6hja-ukfc
5
url VCID-k3ec-bt9r-pkhg
vulnerability_id VCID-k3ec-bt9r-pkhg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44511
published_at 2026-04-16T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44456
published_at 2026-04-12T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44486
published_at 2026-04-11T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.4447
published_at 2026-04-09T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44463
published_at 2026-04-08T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44412
published_at 2026-04-07T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44476
published_at 2026-04-04T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44455
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9397
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
reference_id 2315949
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315949
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
reference_id show_bug.cgi?id=1916659
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:55:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1916659
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9397
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ec-bt9r-pkhg
6
url VCID-ka9e-ps8e-ryc8
vulnerability_id VCID-ka9e-ps8e-ryc8
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.35144
published_at 2026-04-16T12:55:00Z
1
value 0.00147
scoring_system epss
scoring_elements 0.35106
published_at 2026-04-13T12:55:00Z
2
value 0.00147
scoring_system epss
scoring_elements 0.35131
published_at 2026-04-12T12:55:00Z
3
value 0.00147
scoring_system epss
scoring_elements 0.35166
published_at 2026-04-11T12:55:00Z
4
value 0.00147
scoring_system epss
scoring_elements 0.35162
published_at 2026-04-09T12:55:00Z
5
value 0.00147
scoring_system epss
scoring_elements 0.35136
published_at 2026-04-08T12:55:00Z
6
value 0.00147
scoring_system epss
scoring_elements 0.35181
published_at 2026-04-02T12:55:00Z
7
value 0.00147
scoring_system epss
scoring_elements 0.3521
published_at 2026-04-04T12:55:00Z
8
value 0.00147
scoring_system epss
scoring_elements 0.35091
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
reference_id 2315959
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315959
5
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
6
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
7
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
13
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
15
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
18
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
19
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
20
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
21
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
22
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
23
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
24
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
25
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
26
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
27
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
28
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
29
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
30
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
31
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
32
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
33
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
34
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
35
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
reference_id show_bug.cgi?id=1899154
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1899154
36
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
reference_id show_bug.cgi?id=1905843
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:20:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1905843
37
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9392
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ka9e-ps8e-ryc8
7
url VCID-kpun-mgtm-5uhd
vulnerability_id VCID-kpun-mgtm-5uhd
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9399.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
reference_id
reference_type
scores
0
value 0.0026
scoring_system epss
scoring_elements 0.49395
published_at 2026-04-16T12:55:00Z
1
value 0.0026
scoring_system epss
scoring_elements 0.49347
published_at 2026-04-13T12:55:00Z
2
value 0.0026
scoring_system epss
scoring_elements 0.49345
published_at 2026-04-12T12:55:00Z
3
value 0.0026
scoring_system epss
scoring_elements 0.49349
published_at 2026-04-04T12:55:00Z
4
value 0.0026
scoring_system epss
scoring_elements 0.49304
published_at 2026-04-07T12:55:00Z
5
value 0.0026
scoring_system epss
scoring_elements 0.49321
published_at 2026-04-02T12:55:00Z
6
value 0.0026
scoring_system epss
scoring_elements 0.49371
published_at 2026-04-11T12:55:00Z
7
value 0.0026
scoring_system epss
scoring_elements 0.49353
published_at 2026-04-09T12:55:00Z
8
value 0.0026
scoring_system epss
scoring_elements 0.49358
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9399
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
reference_id 2315945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315945
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
16
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
17
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
18
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
19
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
20
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
21
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
22
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
23
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
24
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
25
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
26
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
27
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
28
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
29
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
30
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
31
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
reference_id show_bug.cgi?id=1907726
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:39:09Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1907726
32
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
33
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9399
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpun-mgtm-5uhd
8
url VCID-kx3j-abfc-qfh2
vulnerability_id VCID-kx3j-abfc-qfh2
summary An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin. This could allow them to access cross-origin PDF content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9393.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9393
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40058
published_at 2026-04-16T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40008
published_at 2026-04-13T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40027
published_at 2026-04-12T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40064
published_at 2026-04-11T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40039
published_at 2026-04-02T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40065
published_at 2026-04-04T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.40054
published_at 2026-04-09T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.39986
published_at 2026-04-07T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9393
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315956
reference_id 2315956
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315956
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
6
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
15
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
16
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
17
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
18
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
19
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
20
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
21
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
22
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
23
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
24
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
25
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
26
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
27
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
28
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
29
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
30
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
31
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
32
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1918301
reference_id show_bug.cgi?id=1918301
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-14T15:14:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1918301
33
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9393
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kx3j-abfc-qfh2
9
url VCID-pmkt-c3bw-zkhz
vulnerability_id VCID-pmkt-c3bw-zkhz
summary By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9398.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9398.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9398
reference_id
reference_type
scores
0
value 0.00806
scoring_system epss
scoring_elements 0.74201
published_at 2026-04-16T12:55:00Z
1
value 0.00806
scoring_system epss
scoring_elements 0.74163
published_at 2026-04-13T12:55:00Z
2
value 0.00806
scoring_system epss
scoring_elements 0.7417
published_at 2026-04-12T12:55:00Z
3
value 0.00806
scoring_system epss
scoring_elements 0.74147
published_at 2026-04-04T12:55:00Z
4
value 0.00806
scoring_system epss
scoring_elements 0.74119
published_at 2026-04-07T12:55:00Z
5
value 0.00806
scoring_system epss
scoring_elements 0.74121
published_at 2026-04-02T12:55:00Z
6
value 0.00806
scoring_system epss
scoring_elements 0.74188
published_at 2026-04-11T12:55:00Z
7
value 0.00806
scoring_system epss
scoring_elements 0.74166
published_at 2026-04-09T12:55:00Z
8
value 0.00806
scoring_system epss
scoring_elements 0.74152
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9398
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315952
reference_id 2315952
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315952
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
5
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
7
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
9
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
11
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
12
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
13
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
14
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
15
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
16
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
17
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
18
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
19
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
20
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
21
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
22
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
23
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
24
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
25
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
26
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
27
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1881037
reference_id show_bug.cgi?id=1881037
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-18T19:35:52Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1881037
29
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
30
reference_url https://usn.ubuntu.com/7991-1/
reference_id USN-7991-1
reference_type
scores
url https://usn.ubuntu.com/7991-1/
fixed_packages
aliases CVE-2024-9398
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmkt-c3bw-zkhz
10
url VCID-z6yt-va55-s3ey
vulnerability_id VCID-z6yt-va55-s3ey
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9401.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40067
published_at 2026-04-16T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40018
published_at 2026-04-13T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40037
published_at 2026-04-12T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40074
published_at 2026-04-11T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40063
published_at 2026-04-09T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40049
published_at 2026-04-08T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.39996
published_at 2026-04-07T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40075
published_at 2026-04-04T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40048
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9401
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9401
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
reference_id 2315950
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2315950
5
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_id buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476
6
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
7
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
8
reference_url https://security.gentoo.org/glsa/202505-08
reference_id GLSA-202505-08
reference_type
scores
url https://security.gentoo.org/glsa/202505-08
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
reference_id mfsa2024-46
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-46
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-46/
reference_id mfsa2024-46
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-46/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
reference_id mfsa2024-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-47
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-47/
reference_id mfsa2024-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-47/
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
reference_id mfsa2024-48
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-48
14
reference_url https://www.mozilla.org/security/advisories/mfsa2024-48/
reference_id mfsa2024-48
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-48/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
reference_id mfsa2024-49
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-49
16
reference_url https://www.mozilla.org/security/advisories/mfsa2024-49/
reference_id mfsa2024-49
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-49/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
reference_id mfsa2024-50
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-50
18
reference_url https://www.mozilla.org/security/advisories/mfsa2024-50/
reference_id mfsa2024-50
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:07:26Z/
url https://www.mozilla.org/security/advisories/mfsa2024-50/
19
reference_url https://access.redhat.com/errata/RHSA-2024:7505
reference_id RHSA-2024:7505
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7505
20
reference_url https://access.redhat.com/errata/RHSA-2024:7552
reference_id RHSA-2024:7552
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7552
21
reference_url https://access.redhat.com/errata/RHSA-2024:7621
reference_id RHSA-2024:7621
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7621
22
reference_url https://access.redhat.com/errata/RHSA-2024:7622
reference_id RHSA-2024:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7622
23
reference_url https://access.redhat.com/errata/RHSA-2024:7646
reference_id RHSA-2024:7646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7646
24
reference_url https://access.redhat.com/errata/RHSA-2024:7699
reference_id RHSA-2024:7699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7699
25
reference_url https://access.redhat.com/errata/RHSA-2024:7700
reference_id RHSA-2024:7700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7700
26
reference_url https://access.redhat.com/errata/RHSA-2024:7702
reference_id RHSA-2024:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7702
27
reference_url https://access.redhat.com/errata/RHSA-2024:7703
reference_id RHSA-2024:7703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7703
28
reference_url https://access.redhat.com/errata/RHSA-2024:7704
reference_id RHSA-2024:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7704
29
reference_url https://access.redhat.com/errata/RHSA-2024:7842
reference_id RHSA-2024:7842
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7842
30
reference_url https://access.redhat.com/errata/RHSA-2024:7853
reference_id RHSA-2024:7853
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7853
31
reference_url https://access.redhat.com/errata/RHSA-2024:7854
reference_id RHSA-2024:7854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7854
32
reference_url https://access.redhat.com/errata/RHSA-2024:7855
reference_id RHSA-2024:7855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7855
33
reference_url https://access.redhat.com/errata/RHSA-2024:7856
reference_id RHSA-2024:7856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7856
34
reference_url https://access.redhat.com/errata/RHSA-2024:8166
reference_id RHSA-2024:8166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8166
35
reference_url https://access.redhat.com/errata/RHSA-2024:8169
reference_id RHSA-2024:8169
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8169
36
reference_url https://usn.ubuntu.com/7056-1/
reference_id USN-7056-1
reference_type
scores
url https://usn.ubuntu.com/7056-1/
fixed_packages
aliases CVE-2024-9401
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6yt-va55-s3ey
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@128.3.0-1%3Farch=el9_2