Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@115.14.0-1?arch=el9_0
Typerpm
Namespaceredhat
Namethunderbird
Version115.14.0-1
Qualifiers
arch el9_0
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-2cuh-xyst-rbgv
vulnerability_id VCID-2cuh-xyst-rbgv
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7518
reference_id
reference_type
scores
0
value 0.00318
scoring_system epss
scoring_elements 0.54897
published_at 2026-04-16T12:55:00Z
1
value 0.00318
scoring_system epss
scoring_elements 0.54859
published_at 2026-04-13T12:55:00Z
2
value 0.00318
scoring_system epss
scoring_elements 0.54848
published_at 2026-04-02T12:55:00Z
3
value 0.00318
scoring_system epss
scoring_elements 0.54891
published_at 2026-04-08T12:55:00Z
4
value 0.00318
scoring_system epss
scoring_elements 0.54841
published_at 2026-04-07T12:55:00Z
5
value 0.00318
scoring_system epss
scoring_elements 0.54872
published_at 2026-04-04T12:55:00Z
6
value 0.00318
scoring_system epss
scoring_elements 0.54883
published_at 2026-04-12T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.549
published_at 2026-04-11T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54888
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7518
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303135
reference_id 2303135
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303135
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1875354
reference_id show_bug.cgi?id=1875354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1875354
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
aliases CVE-2024-7518
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cuh-xyst-rbgv
1
url VCID-2pvz-3cmq-53dk
vulnerability_id VCID-2pvz-3cmq-53dk
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7519
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58825
published_at 2026-04-16T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58763
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58793
published_at 2026-04-13T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.5883
published_at 2026-04-11T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58784
published_at 2026-04-04T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58753
published_at 2026-04-07T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-08T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58812
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7519
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303136
reference_id 2303136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303136
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1902307
reference_id show_bug.cgi?id=1902307
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1902307
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
aliases CVE-2024-7519
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pvz-3cmq-53dk
2
url VCID-957q-jagj-9kg7
vulnerability_id VCID-957q-jagj-9kg7
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7527
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.47059
published_at 2026-04-16T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.47003
published_at 2026-04-13T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46996
published_at 2026-04-12T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46981
published_at 2026-04-02T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.46998
published_at 2026-04-09T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.47001
published_at 2026-04-08T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46947
published_at 2026-04-07T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46999
published_at 2026-04-04T12:55:00Z
8
value 0.00239
scoring_system epss
scoring_elements 0.47023
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7527
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303144
reference_id 2303144
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303144
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
reference_id show_bug.cgi?id=1871303
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1871303
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
aliases CVE-2024-7527
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-957q-jagj-9kg7
3
url VCID-drjc-gxrt-q7ha
vulnerability_id VCID-drjc-gxrt-q7ha
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7520
reference_id
reference_type
scores
0
value 0.00655
scoring_system epss
scoring_elements 0.70978
published_at 2026-04-16T12:55:00Z
1
value 0.00655
scoring_system epss
scoring_elements 0.70932
published_at 2026-04-13T12:55:00Z
2
value 0.00655
scoring_system epss
scoring_elements 0.70948
published_at 2026-04-12T12:55:00Z
3
value 0.00655
scoring_system epss
scoring_elements 0.70964
published_at 2026-04-11T12:55:00Z
4
value 0.00655
scoring_system epss
scoring_elements 0.70941
published_at 2026-04-09T12:55:00Z
5
value 0.00655
scoring_system epss
scoring_elements 0.70889
published_at 2026-04-02T12:55:00Z
6
value 0.00655
scoring_system epss
scoring_elements 0.70926
published_at 2026-04-08T12:55:00Z
7
value 0.00655
scoring_system epss
scoring_elements 0.70882
published_at 2026-04-07T12:55:00Z
8
value 0.00655
scoring_system epss
scoring_elements 0.70907
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7520
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303137
reference_id 2303137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303137
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1903041
reference_id show_bug.cgi?id=1903041
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1903041
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
aliases CVE-2024-7520
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drjc-gxrt-q7ha
4
url VCID-s556-eg79-77gu
vulnerability_id VCID-s556-eg79-77gu
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7522
reference_id
reference_type
scores
0
value 0.00247
scoring_system epss
scoring_elements 0.47997
published_at 2026-04-16T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.47914
published_at 2026-04-02T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.47942
published_at 2026-04-13T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47933
published_at 2026-04-12T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.47936
published_at 2026-04-08T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.47884
published_at 2026-04-07T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47935
published_at 2026-04-04T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.47955
published_at 2026-04-11T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.47931
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7522
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303139
reference_id 2303139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303139
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1906727
reference_id show_bug.cgi?id=1906727
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1906727
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
aliases CVE-2024-7522
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s556-eg79-77gu
5
url VCID-tegn-2y58-t3de
vulnerability_id VCID-tegn-2y58-t3de
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7521
reference_id
reference_type
scores
0
value 0.00261
scoring_system epss
scoring_elements 0.49477
published_at 2026-04-16T12:55:00Z
1
value 0.00261
scoring_system epss
scoring_elements 0.49411
published_at 2026-04-02T12:55:00Z
2
value 0.00261
scoring_system epss
scoring_elements 0.49431
published_at 2026-04-13T12:55:00Z
3
value 0.00261
scoring_system epss
scoring_elements 0.49429
published_at 2026-04-12T12:55:00Z
4
value 0.00261
scoring_system epss
scoring_elements 0.49445
published_at 2026-04-08T12:55:00Z
5
value 0.00261
scoring_system epss
scoring_elements 0.49391
published_at 2026-04-07T12:55:00Z
6
value 0.00261
scoring_system epss
scoring_elements 0.49437
published_at 2026-04-04T12:55:00Z
7
value 0.00261
scoring_system epss
scoring_elements 0.49458
published_at 2026-04-11T12:55:00Z
8
value 0.00261
scoring_system epss
scoring_elements 0.49441
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7521
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303138
reference_id 2303138
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303138
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1904644
reference_id show_bug.cgi?id=1904644
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1904644
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
aliases CVE-2024-7521
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tegn-2y58-t3de
6
url VCID-xevc-xbcg-1yct
vulnerability_id VCID-xevc-xbcg-1yct
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7526
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.50675
published_at 2026-04-16T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50598
published_at 2026-04-02T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50634
published_at 2026-04-13T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50648
published_at 2026-04-12T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50632
published_at 2026-04-08T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50578
published_at 2026-04-07T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50626
published_at 2026-04-04T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50671
published_at 2026-04-11T12:55:00Z
8
value 0.00272
scoring_system epss
scoring_elements 0.50629
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7526
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303143
reference_id 2303143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303143
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1910306
reference_id show_bug.cgi?id=1910306
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1910306
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
aliases CVE-2024-7526
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xevc-xbcg-1yct
7
url VCID-xyqa-esey-73e1
vulnerability_id VCID-xyqa-esey-73e1
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7525
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33474
published_at 2026-04-16T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33549
published_at 2026-04-02T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33437
published_at 2026-04-13T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33461
published_at 2026-04-12T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33465
published_at 2026-04-08T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33421
published_at 2026-04-07T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33582
published_at 2026-04-04T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33502
published_at 2026-04-11T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33499
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7525
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303142
reference_id 2303142
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303142
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1909298
reference_id show_bug.cgi?id=1909298
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1909298
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
aliases CVE-2024-7525
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xyqa-esey-73e1
8
url VCID-z6kw-szww-7feq
vulnerability_id VCID-z6kw-szww-7feq
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7529
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31849
published_at 2026-04-16T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31947
published_at 2026-04-02T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.31818
published_at 2026-04-13T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31853
published_at 2026-04-12T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31861
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31808
published_at 2026-04-07T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31988
published_at 2026-04-04T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31892
published_at 2026-04-11T12:55:00Z
8
value 0.00126
scoring_system epss
scoring_elements 0.31889
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303146
reference_id 2303146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303146
13
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
14
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
15
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
17
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
reference_id mfsa2024-34
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-34
19
reference_url https://www.mozilla.org/security/advisories/mfsa2024-34/
reference_id mfsa2024-34
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-34/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
21
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
23
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
24
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
reference_id mfsa2024-38
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-38
25
reference_url https://www.mozilla.org/security/advisories/mfsa2024-38/
reference_id mfsa2024-38
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://www.mozilla.org/security/advisories/mfsa2024-38/
26
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
27
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
28
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
29
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
30
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
31
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
32
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
33
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
34
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
35
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
36
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
37
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
38
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
39
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
40
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
41
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
42
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
43
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1903187
reference_id show_bug.cgi?id=1903187
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1903187
44
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
45
reference_url https://usn.ubuntu.com/6995-1/
reference_id USN-6995-1
reference_type
scores
url https://usn.ubuntu.com/6995-1/
fixed_packages
aliases CVE-2024-7529
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6kw-szww-7feq
9
url VCID-zveb-b3t7-7yfg
vulnerability_id VCID-zveb-b3t7-7yfg
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-7528
reference_id
reference_type
scores
0
value 0.00238
scoring_system epss
scoring_elements 0.4692
published_at 2026-04-16T12:55:00Z
1
value 0.00238
scoring_system epss
scoring_elements 0.46865
published_at 2026-04-13T12:55:00Z
2
value 0.00238
scoring_system epss
scoring_elements 0.46857
published_at 2026-04-12T12:55:00Z
3
value 0.00238
scoring_system epss
scoring_elements 0.46884
published_at 2026-04-11T12:55:00Z
4
value 0.00238
scoring_system epss
scoring_elements 0.46861
published_at 2026-04-09T12:55:00Z
5
value 0.00238
scoring_system epss
scoring_elements 0.46841
published_at 2026-04-02T12:55:00Z
6
value 0.00238
scoring_system epss
scoring_elements 0.46862
published_at 2026-04-08T12:55:00Z
7
value 0.00238
scoring_system epss
scoring_elements 0.46808
published_at 2026-04-07T12:55:00Z
8
value 0.00238
scoring_system epss
scoring_elements 0.46859
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-7528
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2303145
reference_id 2303145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2303145
4
reference_url https://security.gentoo.org/glsa/202412-04
reference_id GLSA-202412-04
reference_type
scores
url https://security.gentoo.org/glsa/202412-04
5
reference_url https://security.gentoo.org/glsa/202412-06
reference_id GLSA-202412-06
reference_type
scores
url https://security.gentoo.org/glsa/202412-06
6
reference_url https://security.gentoo.org/glsa/202412-13
reference_id GLSA-202412-13
reference_type
scores
url https://security.gentoo.org/glsa/202412-13
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
reference_id mfsa2024-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-33
8
reference_url https://www.mozilla.org/security/advisories/mfsa2024-33/
reference_id mfsa2024-33
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-33/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
reference_id mfsa2024-35
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-35
10
reference_url https://www.mozilla.org/security/advisories/mfsa2024-35/
reference_id mfsa2024-35
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-35/
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
reference_id mfsa2024-37
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2024-37
12
reference_url https://www.mozilla.org/security/advisories/mfsa2024-37/
reference_id mfsa2024-37
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://www.mozilla.org/security/advisories/mfsa2024-37/
13
reference_url https://access.redhat.com/errata/RHSA-2024:5322
reference_id RHSA-2024:5322
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5322
14
reference_url https://access.redhat.com/errata/RHSA-2024:5323
reference_id RHSA-2024:5323
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5323
15
reference_url https://access.redhat.com/errata/RHSA-2024:5324
reference_id RHSA-2024:5324
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5324
16
reference_url https://access.redhat.com/errata/RHSA-2024:5325
reference_id RHSA-2024:5325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5325
17
reference_url https://access.redhat.com/errata/RHSA-2024:5326
reference_id RHSA-2024:5326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5326
18
reference_url https://access.redhat.com/errata/RHSA-2024:5327
reference_id RHSA-2024:5327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5327
19
reference_url https://access.redhat.com/errata/RHSA-2024:5328
reference_id RHSA-2024:5328
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5328
20
reference_url https://access.redhat.com/errata/RHSA-2024:5329
reference_id RHSA-2024:5329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5329
21
reference_url https://access.redhat.com/errata/RHSA-2024:5391
reference_id RHSA-2024:5391
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5391
22
reference_url https://access.redhat.com/errata/RHSA-2024:5392
reference_id RHSA-2024:5392
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5392
23
reference_url https://access.redhat.com/errata/RHSA-2024:5393
reference_id RHSA-2024:5393
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5393
24
reference_url https://access.redhat.com/errata/RHSA-2024:5394
reference_id RHSA-2024:5394
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5394
25
reference_url https://access.redhat.com/errata/RHSA-2024:5395
reference_id RHSA-2024:5395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5395
26
reference_url https://access.redhat.com/errata/RHSA-2024:5396
reference_id RHSA-2024:5396
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5396
27
reference_url https://access.redhat.com/errata/RHSA-2024:5402
reference_id RHSA-2024:5402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5402
28
reference_url https://access.redhat.com/errata/RHSA-2024:5527
reference_id RHSA-2024:5527
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5527
29
reference_url https://access.redhat.com/errata/RHSA-2024:5528
reference_id RHSA-2024:5528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:5528
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1895951
reference_id show_bug.cgi?id=1895951
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1895951
31
reference_url https://usn.ubuntu.com/6966-1/
reference_id USN-6966-1
reference_type
scores
url https://usn.ubuntu.com/6966-1/
fixed_packages
aliases CVE-2024-7528
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zveb-b3t7-7yfg
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@115.14.0-1%3Farch=el9_0