Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
Typeapk
Namespacealpine
Namelibrewolf
Version103.0-r0
Qualifiers
arch aarch64
distroversion v3.21
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1uqv-yk9v-nkau
vulnerability_id VCID-1uqv-yk9v-nkau
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36316
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49587
published_at 2026-04-16T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.4952
published_at 2026-04-02T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49555
published_at 2026-04-08T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.4955
published_at 2026-04-09T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49567
published_at 2026-04-11T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49539
published_at 2026-04-12T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.4954
published_at 2026-04-13T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.49547
published_at 2026-04-04T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.495
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36316
1
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:05:41Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1768583
reference_id show_bug.cgi?id=1768583
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:05:41Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1768583
5
reference_url https://usn.ubuntu.com/5536-1/
reference_id USN-5536-1
reference_type
scores
url https://usn.ubuntu.com/5536-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-36316
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1uqv-yk9v-nkau
1
url VCID-8uk6-x62z-uybr
vulnerability_id VCID-8uk6-x62z-uybr
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2505.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2505
reference_id
reference_type
scores
0
value 0.00212
scoring_system epss
scoring_elements 0.43782
published_at 2026-04-04T12:55:00Z
1
value 0.00212
scoring_system epss
scoring_elements 0.43758
published_at 2026-04-12T12:55:00Z
2
value 0.00212
scoring_system epss
scoring_elements 0.4379
published_at 2026-04-11T12:55:00Z
3
value 0.00212
scoring_system epss
scoring_elements 0.4377
published_at 2026-04-09T12:55:00Z
4
value 0.00212
scoring_system epss
scoring_elements 0.43767
published_at 2026-04-08T12:55:00Z
5
value 0.00212
scoring_system epss
scoring_elements 0.43715
published_at 2026-04-07T12:55:00Z
6
value 0.00212
scoring_system epss
scoring_elements 0.43757
published_at 2026-04-02T12:55:00Z
7
value 0.00212
scoring_system epss
scoring_elements 0.43803
published_at 2026-04-16T12:55:00Z
8
value 0.00212
scoring_system epss
scoring_elements 0.43742
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2505
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2111910
reference_id 2111910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2111910
4
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1769739%2C1772824
reference_id buglist.cgi?bug_id=1769739%2C1772824
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1769739%2C1772824
5
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
7
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
reference_id mfsa2022-30
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
9
reference_url https://www.mozilla.org/security/advisories/mfsa2022-30/
reference_id mfsa2022-30
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-30/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
reference_id mfsa2022-32
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
11
reference_url https://www.mozilla.org/security/advisories/mfsa2022-32/
reference_id mfsa2022-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-32/
12
reference_url https://access.redhat.com/errata/RHSA-2022:5765
reference_id RHSA-2022:5765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5765
13
reference_url https://access.redhat.com/errata/RHSA-2022:5766
reference_id RHSA-2022:5766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5766
14
reference_url https://access.redhat.com/errata/RHSA-2022:5767
reference_id RHSA-2022:5767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5767
15
reference_url https://access.redhat.com/errata/RHSA-2022:5769
reference_id RHSA-2022:5769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5769
16
reference_url https://access.redhat.com/errata/RHSA-2022:5770
reference_id RHSA-2022:5770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5770
17
reference_url https://access.redhat.com/errata/RHSA-2022:5771
reference_id RHSA-2022:5771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5771
18
reference_url https://access.redhat.com/errata/RHSA-2022:5772
reference_id RHSA-2022:5772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5772
19
reference_url https://access.redhat.com/errata/RHSA-2022:5773
reference_id RHSA-2022:5773
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5773
20
reference_url https://access.redhat.com/errata/RHSA-2022:5774
reference_id RHSA-2022:5774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5774
21
reference_url https://access.redhat.com/errata/RHSA-2022:5776
reference_id RHSA-2022:5776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5776
22
reference_url https://access.redhat.com/errata/RHSA-2022:5777
reference_id RHSA-2022:5777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5777
23
reference_url https://access.redhat.com/errata/RHSA-2022:5778
reference_id RHSA-2022:5778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5778
24
reference_url https://usn.ubuntu.com/5536-1/
reference_id USN-5536-1
reference_type
scores
url https://usn.ubuntu.com/5536-1/
25
reference_url https://usn.ubuntu.com/5663-1/
reference_id USN-5663-1
reference_type
scores
url https://usn.ubuntu.com/5663-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-2505
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk6-x62z-uybr
2
url VCID-9tnj-j5xv-43cm
vulnerability_id VCID-9tnj-j5xv-43cm
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36318.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36318.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36318
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.4167
published_at 2026-04-13T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41709
published_at 2026-04-04T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41637
published_at 2026-04-07T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41686
published_at 2026-04-08T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41695
published_at 2026-04-09T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41682
published_at 2026-04-02T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41718
published_at 2026-04-16T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41685
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36318
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2111908
reference_id 2111908
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2111908
6
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
7
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
9
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-29
reference_id mfsa2022-29
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-29
11
reference_url https://www.mozilla.org/security/advisories/mfsa2022-29/
reference_id mfsa2022-29
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-29/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
reference_id mfsa2022-30
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-30/
reference_id mfsa2022-30
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-30/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-31
reference_id mfsa2022-31
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-31
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-31/
reference_id mfsa2022-31
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-31/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
reference_id mfsa2022-32
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-32/
reference_id mfsa2022-32
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-32/
18
reference_url https://access.redhat.com/errata/RHSA-2022:5765
reference_id RHSA-2022:5765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5765
19
reference_url https://access.redhat.com/errata/RHSA-2022:5766
reference_id RHSA-2022:5766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5766
20
reference_url https://access.redhat.com/errata/RHSA-2022:5767
reference_id RHSA-2022:5767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5767
21
reference_url https://access.redhat.com/errata/RHSA-2022:5769
reference_id RHSA-2022:5769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5769
22
reference_url https://access.redhat.com/errata/RHSA-2022:5770
reference_id RHSA-2022:5770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5770
23
reference_url https://access.redhat.com/errata/RHSA-2022:5771
reference_id RHSA-2022:5771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5771
24
reference_url https://access.redhat.com/errata/RHSA-2022:5772
reference_id RHSA-2022:5772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5772
25
reference_url https://access.redhat.com/errata/RHSA-2022:5773
reference_id RHSA-2022:5773
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5773
26
reference_url https://access.redhat.com/errata/RHSA-2022:5774
reference_id RHSA-2022:5774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5774
27
reference_url https://access.redhat.com/errata/RHSA-2022:5776
reference_id RHSA-2022:5776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5776
28
reference_url https://access.redhat.com/errata/RHSA-2022:5777
reference_id RHSA-2022:5777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5777
29
reference_url https://access.redhat.com/errata/RHSA-2022:5778
reference_id RHSA-2022:5778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5778
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1771774
reference_id show_bug.cgi?id=1771774
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1771774
31
reference_url https://usn.ubuntu.com/5536-1/
reference_id USN-5536-1
reference_type
scores
url https://usn.ubuntu.com/5536-1/
32
reference_url https://usn.ubuntu.com/5663-1/
reference_id USN-5663-1
reference_type
scores
url https://usn.ubuntu.com/5663-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-36318
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9tnj-j5xv-43cm
3
url VCID-akhr-nck5-sfh2
vulnerability_id VCID-akhr-nck5-sfh2
summary When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.This bug only affects Thunderbird for Windows. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36314.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36314.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36314
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13285
published_at 2026-04-04T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13148
published_at 2026-04-12T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13185
published_at 2026-04-11T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13217
published_at 2026-04-09T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13165
published_at 2026-04-08T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13084
published_at 2026-04-07T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13219
published_at 2026-04-02T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.12997
published_at 2026-04-16T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13096
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36314
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2111909
reference_id 2111909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2111909
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
5
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:33:47Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
reference_id mfsa2022-30
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
7
reference_url https://www.mozilla.org/security/advisories/mfsa2022-30/
reference_id mfsa2022-30
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:33:47Z/
url https://www.mozilla.org/security/advisories/mfsa2022-30/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
reference_id mfsa2022-32
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
9
reference_url https://www.mozilla.org/security/advisories/mfsa2022-32/
reference_id mfsa2022-32
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:33:47Z/
url https://www.mozilla.org/security/advisories/mfsa2022-32/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1773894
reference_id show_bug.cgi?id=1773894
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:33:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1773894
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-36314
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-akhr-nck5-sfh2
4
url VCID-jxwt-d17p-1fgk
vulnerability_id VCID-jxwt-d17p-1fgk
summary When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service.*This bug only affects Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36317
reference_id
reference_type
scores
0
value 0.00268
scoring_system epss
scoring_elements 0.50315
published_at 2026-04-16T12:55:00Z
1
value 0.00268
scoring_system epss
scoring_elements 0.50257
published_at 2026-04-02T12:55:00Z
2
value 0.00268
scoring_system epss
scoring_elements 0.50289
published_at 2026-04-08T12:55:00Z
3
value 0.00268
scoring_system epss
scoring_elements 0.50282
published_at 2026-04-09T12:55:00Z
4
value 0.00268
scoring_system epss
scoring_elements 0.50309
published_at 2026-04-11T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50283
published_at 2026-04-12T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.50271
published_at 2026-04-13T12:55:00Z
7
value 0.00268
scoring_system epss
scoring_elements 0.50287
published_at 2026-04-04T12:55:00Z
8
value 0.00268
scoring_system epss
scoring_elements 0.50236
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36317
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
2
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:09:04Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1759951
reference_id show_bug.cgi?id=1759951
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:09:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1759951
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-36317
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxwt-d17p-1fgk
5
url VCID-sd2d-m1n5-8kdg
vulnerability_id VCID-sd2d-m1n5-8kdg
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36320
reference_id
reference_type
scores
0
value 0.00511
scoring_system epss
scoring_elements 0.66481
published_at 2026-04-16T12:55:00Z
1
value 0.00511
scoring_system epss
scoring_elements 0.6641
published_at 2026-04-02T12:55:00Z
2
value 0.00511
scoring_system epss
scoring_elements 0.66456
published_at 2026-04-08T12:55:00Z
3
value 0.00511
scoring_system epss
scoring_elements 0.66469
published_at 2026-04-09T12:55:00Z
4
value 0.00511
scoring_system epss
scoring_elements 0.66489
published_at 2026-04-11T12:55:00Z
5
value 0.00511
scoring_system epss
scoring_elements 0.66477
published_at 2026-04-12T12:55:00Z
6
value 0.00511
scoring_system epss
scoring_elements 0.66446
published_at 2026-04-13T12:55:00Z
7
value 0.00511
scoring_system epss
scoring_elements 0.66437
published_at 2026-04-04T12:55:00Z
8
value 0.00511
scoring_system epss
scoring_elements 0.66407
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36320
1
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1759794%2C1760998
reference_id buglist.cgi?bug_id=1759794%2C1760998
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T16:55:17Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1759794%2C1760998
2
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
4
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T16:55:17Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
5
reference_url https://usn.ubuntu.com/5536-1/
reference_id USN-5536-1
reference_type
scores
url https://usn.ubuntu.com/5536-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-36320
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sd2d-m1n5-8kdg
6
url VCID-utn2-nt3q-fugv
vulnerability_id VCID-utn2-nt3q-fugv
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36315
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.36813
published_at 2026-04-16T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36888
published_at 2026-04-02T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36803
published_at 2026-04-08T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36818
published_at 2026-04-09T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36827
published_at 2026-04-11T12:55:00Z
5
value 0.00159
scoring_system epss
scoring_elements 0.36792
published_at 2026-04-12T12:55:00Z
6
value 0.00159
scoring_system epss
scoring_elements 0.36767
published_at 2026-04-13T12:55:00Z
7
value 0.00159
scoring_system epss
scoring_elements 0.36919
published_at 2026-04-04T12:55:00Z
8
value 0.00159
scoring_system epss
scoring_elements 0.36752
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36315
1
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:19:25Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1762520
reference_id show_bug.cgi?id=1762520
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:19:25Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1762520
5
reference_url https://usn.ubuntu.com/5536-1/
reference_id USN-5536-1
reference_type
scores
url https://usn.ubuntu.com/5536-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-36315
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-utn2-nt3q-fugv
7
url VCID-vgqa-e7yg-wygj
vulnerability_id VCID-vgqa-e7yg-wygj
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36319.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36319.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-36319
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35488
published_at 2026-04-16T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35551
published_at 2026-04-04T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35434
published_at 2026-04-07T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.3548
published_at 2026-04-08T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35504
published_at 2026-04-09T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35526
published_at 2026-04-02T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35448
published_at 2026-04-13T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35514
published_at 2026-04-11T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35471
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-36319
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2111907
reference_id 2111907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2111907
6
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
7
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
reference_id mfsa2022-28
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-28
9
reference_url https://www.mozilla.org/security/advisories/mfsa2022-28/
reference_id mfsa2022-28
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/
url https://www.mozilla.org/security/advisories/mfsa2022-28/
10
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-29
reference_id mfsa2022-29
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-29
11
reference_url https://www.mozilla.org/security/advisories/mfsa2022-29/
reference_id mfsa2022-29
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/
url https://www.mozilla.org/security/advisories/mfsa2022-29/
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
reference_id mfsa2022-30
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-30
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-30/
reference_id mfsa2022-30
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/
url https://www.mozilla.org/security/advisories/mfsa2022-30/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-31
reference_id mfsa2022-31
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-31
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-31/
reference_id mfsa2022-31
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/
url https://www.mozilla.org/security/advisories/mfsa2022-31/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
reference_id mfsa2022-32
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-32
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-32/
reference_id mfsa2022-32
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/
url https://www.mozilla.org/security/advisories/mfsa2022-32/
18
reference_url https://access.redhat.com/errata/RHSA-2022:5765
reference_id RHSA-2022:5765
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5765
19
reference_url https://access.redhat.com/errata/RHSA-2022:5766
reference_id RHSA-2022:5766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5766
20
reference_url https://access.redhat.com/errata/RHSA-2022:5767
reference_id RHSA-2022:5767
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5767
21
reference_url https://access.redhat.com/errata/RHSA-2022:5769
reference_id RHSA-2022:5769
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5769
22
reference_url https://access.redhat.com/errata/RHSA-2022:5770
reference_id RHSA-2022:5770
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5770
23
reference_url https://access.redhat.com/errata/RHSA-2022:5771
reference_id RHSA-2022:5771
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5771
24
reference_url https://access.redhat.com/errata/RHSA-2022:5772
reference_id RHSA-2022:5772
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5772
25
reference_url https://access.redhat.com/errata/RHSA-2022:5773
reference_id RHSA-2022:5773
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5773
26
reference_url https://access.redhat.com/errata/RHSA-2022:5774
reference_id RHSA-2022:5774
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5774
27
reference_url https://access.redhat.com/errata/RHSA-2022:5776
reference_id RHSA-2022:5776
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5776
28
reference_url https://access.redhat.com/errata/RHSA-2022:5777
reference_id RHSA-2022:5777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5777
29
reference_url https://access.redhat.com/errata/RHSA-2022:5778
reference_id RHSA-2022:5778
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5778
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1737722
reference_id show_bug.cgi?id=1737722
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1737722
31
reference_url https://usn.ubuntu.com/5536-1/
reference_id USN-5536-1
reference_type
scores
url https://usn.ubuntu.com/5536-1/
32
reference_url https://usn.ubuntu.com/5663-1/
reference_id USN-5663-1
reference_type
scores
url https://usn.ubuntu.com/5663-1/
fixed_packages
0
url pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
purl pkg:apk/alpine/librewolf@103.0-r0?arch=aarch64&distroversion=v3.21&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community
aliases CVE-2022-36319
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vgqa-e7yg-wygj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/librewolf@103.0-r0%3Farch=aarch64&distroversion=v3.21&reponame=community