Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-9tkb-9fch-67bc
Vulnerability ID VCID-9tkb-9fch-67bc
Aliases CVE-2022-1802
Summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1802.json
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
epss 0.67932 https://api.first.org/data/v1/epss?cve=CVE-2022-1802
cvssv3.1 8.8 https://bugzilla.mozilla.org/show_bug.cgi?id=1770137
ssvc Track* https://bugzilla.mozilla.org/show_bug.cgi?id=1770137
cvssv3.1 7.5 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
archlinux Critical https://security.archlinux.org/AVG-2728
archlinux Critical https://security.archlinux.org/AVG-2729
generic_textual critical https://www.mozilla.org/en-US/security/advisories/mfsa2022-19
cvssv3.1 8.8 https://www.mozilla.org/security/advisories/mfsa2022-19/
ssvc Track* https://www.mozilla.org/security/advisories/mfsa2022-19/
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1802.json
https://api.first.org/data/v1/epss?cve=CVE-2022-1802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2089217 https://bugzilla.redhat.com/show_bug.cgi?id=2089217
AVG-2728 https://security.archlinux.org/AVG-2728
AVG-2729 https://security.archlinux.org/AVG-2729
GLSA-202208-08 https://security.gentoo.org/glsa/202208-08
GLSA-202208-14 https://security.gentoo.org/glsa/202208-14
mfsa2022-19 https://www.mozilla.org/en-US/security/advisories/mfsa2022-19
mfsa2022-19 https://www.mozilla.org/security/advisories/mfsa2022-19/
RHSA-2022:4729 https://access.redhat.com/errata/RHSA-2022:4729
RHSA-2022:4730 https://access.redhat.com/errata/RHSA-2022:4730
RHSA-2022:4765 https://access.redhat.com/errata/RHSA-2022:4765
RHSA-2022:4766 https://access.redhat.com/errata/RHSA-2022:4766
RHSA-2022:4767 https://access.redhat.com/errata/RHSA-2022:4767
RHSA-2022:4768 https://access.redhat.com/errata/RHSA-2022:4768
RHSA-2022:4769 https://access.redhat.com/errata/RHSA-2022:4769
RHSA-2022:4770 https://access.redhat.com/errata/RHSA-2022:4770
RHSA-2022:4772 https://access.redhat.com/errata/RHSA-2022:4772
RHSA-2022:4773 https://access.redhat.com/errata/RHSA-2022:4773
RHSA-2022:4774 https://access.redhat.com/errata/RHSA-2022:4774
RHSA-2022:4776 https://access.redhat.com/errata/RHSA-2022:4776
show_bug.cgi?id=1770137 https://bugzilla.mozilla.org/show_bug.cgi?id=1770137
USN-5434-1 https://usn.ubuntu.com/5434-1/
USN-5435-1 https://usn.ubuntu.com/5435-1/
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1802.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1770137
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:16:27Z/ Found at https://bugzilla.mozilla.org/show_bug.cgi?id=1770137
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://www.mozilla.org/security/advisories/mfsa2022-19/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:16:27Z/ Found at https://www.mozilla.org/security/advisories/mfsa2022-19/
Exploit Prediction Scoring System (EPSS)
Percentile 0.98576
EPSS Score 0.67932
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:58:34.477913+00:00 Gentoo Importer Import https://security.gentoo.org/glsa/202208-14 38.0.0