{"url":"http://public2.vulnerablecode.io/api/packages/104558?format=json","purl":"pkg:rpm/redhat/thunderbird@68.4.1-2?arch=el8_0","type":"rpm","namespace":"redhat","name":"thunderbird","version":"68.4.1-2","qualifiers":{"arch":"el8_0"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31932?format=json","vulnerability_id":"VCID-3smq-ax5u-ryd3","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012","reference_id":"","reference_type":"","scores":[{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84379","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.8428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84304","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84337","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84362","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84275","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84276","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437","reference_id":"1779437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17012"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3smq-ax5u-ryd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51223?format=json","vulnerability_id":"VCID-7hkk-2k6p-vyc7","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17024.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17024.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17024","reference_id":"","reference_type":"","scores":[{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87266","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87205","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87211","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87235","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87247","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87126","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87143","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.8714","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.8716","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87181","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87171","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87192","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03276","scoring_system":"epss","scoring_elements":"0.87186","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788727","reference_id":"1788727","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788727"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17024"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7hkk-2k6p-vyc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51221?format=json","vulnerability_id":"VCID-c4qs-a9kw-p3hc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17017.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17017.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17017","reference_id":"","reference_type":"","scores":[{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85796","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.8574","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85742","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85758","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.8578","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85608","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85684","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85706","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0263","scoring_system":"epss","scoring_elements":"0.85705","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788724","reference_id":"1788724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788724"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17017"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4qs-a9kw-p3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31928?format=json","vulnerability_id":"VCID-ex1b-2rdy-7qhw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005","reference_id":"","reference_type":"","scores":[{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86363","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86281","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86293","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86322","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86344","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86209","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86276","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435","reference_id":"1779435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17005"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1b-2rdy-7qhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51222?format=json","vulnerability_id":"VCID-javq-3r82-73fq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17022.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17022.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17022","reference_id":"","reference_type":"","scores":[{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88388","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03924","scoring_system":"epss","scoring_elements":"0.88375","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89296","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89242","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89257","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89259","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.8929","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04633","scoring_system":"epss","scoring_elements":"0.89286","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788726","reference_id":"1788726","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788726"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17022"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-javq-3r82-73fq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31929?format=json","vulnerability_id":"VCID-pws7-8qmm-hfes","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008","reference_id":"","reference_type":"","scores":[{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75076","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74972","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75009","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75018","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75026","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.75053","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74973","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.7498","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431","reference_id":"1779431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17008"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pws7-8qmm-hfes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51220?format=json","vulnerability_id":"VCID-x12h-hqf2-37cc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17016.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17016.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17016","reference_id":"","reference_type":"","scores":[{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86515","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86476","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02928","scoring_system":"epss","scoring_elements":"0.86495","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.8748","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87549","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.8749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87525","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.87536","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03465","scoring_system":"epss","scoring_elements":"0.8755","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788723","reference_id":"1788723","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1788723"},{"reference_url":"https://security.archlinux.org/ASA-202001-1","reference_id":"ASA-202001-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-1"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1084","reference_id":"AVG-1084","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1084"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01","reference_id":"mfsa2020-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02","reference_id":"mfsa2020-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17016"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x12h-hqf2-37cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51224?format=json","vulnerability_id":"VCID-zbpq-qcww-6yg1","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17026.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17026.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17026","reference_id":"","reference_type":"","scores":[{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98247","published_at":"2026-05-09T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98235","published_at":"2026-04-18T12:55:00Z"},{"value":"0.5907","scoring_system":"epss","scoring_elements":"0.98233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.59605","scoring_system":"epss","scoring_elements":"0.98262","published_at":"2026-04-29T12:55:00Z"},{"value":"0.59605","scoring_system":"epss","scoring_elements":"0.9826","published_at":"2026-04-24T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98451","published_at":"2026-04-01T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98453","published_at":"2026-04-02T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98456","published_at":"2026-04-04T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98457","published_at":"2026-04-07T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.64805","scoring_system":"epss","scoring_elements":"0.98462","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17026"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789214","reference_id":"1789214","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1789214"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948452","reference_id":"948452","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948452"},{"reference_url":"https://security.archlinux.org/ASA-202001-3","reference_id":"ASA-202001-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-3"},{"reference_url":"https://security.archlinux.org/ASA-202001-4","reference_id":"ASA-202001-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202001-4"},{"reference_url":"https://security.archlinux.org/AVG-1085","reference_id":"AVG-1085","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1085"},{"reference_url":"https://security.archlinux.org/AVG-1086","reference_id":"AVG-1086","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1086"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/49864.js","reference_id":"CVE-2019-17026","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86-64/local/49864.js"},{"reference_url":"http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html","reference_id":"Firefox-72-IonMonkey-JIT-Type-Confusion.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"http://packetstormsecurity.com/files/162568/Firefox-72-IonMonkey-JIT-Type-Confusion.html"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-03","reference_id":"mfsa2020-03","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-03"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-03/","reference_id":"mfsa2020-03","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2020-03/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-04/","reference_id":"mfsa2020-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2020-04/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0085","reference_id":"RHSA-2020:0085","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0085"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0086","reference_id":"RHSA-2020:0086","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0111","reference_id":"RHSA-2020:0111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0120","reference_id":"RHSA-2020:0120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0123","reference_id":"RHSA-2020:0123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0127","reference_id":"RHSA-2020:0127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607443","reference_id":"show_bug.cgi?id=1607443","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607443"},{"reference_url":"https://usn.ubuntu.com/4234-1/","reference_id":"USN-4234-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4234-1/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T12:48:51Z/"}],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17026"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zbpq-qcww-6yg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31931?format=json","vulnerability_id":"VCID-zh2m-qyw5-dkgn","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.8002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79967","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436","reference_id":"1779436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17011"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zh2m-qyw5-dkgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31930?format=json","vulnerability_id":"VCID-zstj-sux9-ubdd","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80071","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.7997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79998","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.8002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80033","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.80056","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79967","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434","reference_id":"1779434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[],"aliases":["CVE-2019-17010"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zstj-sux9-ubdd"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@68.4.1-2%3Farch=el8_0"}