Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version91.8.0-r0
Qualifiers
arch armhf
distroversion v3.16
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version91.9.0-r0
Latest_non_vulnerable_version91.12.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4yvm-d9qr-ebaw
vulnerability_id VCID-4yvm-d9qr-ebaw
summary Multiple vulnerabilities have been discovered in NSS, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1097.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1097.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1097
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.49028
published_at 2026-04-04T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49072
published_at 2026-04-16T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.49027
published_at 2026-04-13T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49021
published_at 2026-04-12T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49048
published_at 2026-04-11T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.49032
published_at 2026-04-09T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.49035
published_at 2026-04-08T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.48981
published_at 2026-04-07T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.48964
published_at 2026-04-01T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.49
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1097
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072559
reference_id 2072559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072559
13
reference_url https://security.archlinux.org/AVG-2711
reference_id AVG-2711
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2711
14
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
15
reference_url https://security.gentoo.org/glsa/202212-05
reference_id GLSA-202212-05
reference_type
scores
url https://security.gentoo.org/glsa/202212-05
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
reference_id mfsa2022-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-13/
reference_id mfsa2022-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-13/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-14/
reference_id mfsa2022-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-14/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-15/
reference_id mfsa2022-15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-15/
22
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
23
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
24
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
25
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
26
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
27
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
28
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
29
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
30
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
31
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
32
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1745667
reference_id show_bug.cgi?id=1745667
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1745667
33
reference_url https://usn.ubuntu.com/5370-1/
reference_id USN-5370-1
reference_type
scores
url https://usn.ubuntu.com/5370-1/
34
reference_url https://usn.ubuntu.com/5393-1/
reference_id USN-5393-1
reference_type
scores
url https://usn.ubuntu.com/5393-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-1097
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yvm-d9qr-ebaw
1
url VCID-59up-n66e-fyhx
vulnerability_id VCID-59up-n66e-fyhx
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28281.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28281.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28281
reference_id
reference_type
scores
0
value 0.13838
scoring_system epss
scoring_elements 0.94273
published_at 2026-04-04T12:55:00Z
1
value 0.13838
scoring_system epss
scoring_elements 0.94307
published_at 2026-04-16T12:55:00Z
2
value 0.13838
scoring_system epss
scoring_elements 0.94293
published_at 2026-04-13T12:55:00Z
3
value 0.13838
scoring_system epss
scoring_elements 0.94292
published_at 2026-04-12T12:55:00Z
4
value 0.13838
scoring_system epss
scoring_elements 0.94291
published_at 2026-04-11T12:55:00Z
5
value 0.13838
scoring_system epss
scoring_elements 0.94288
published_at 2026-04-09T12:55:00Z
6
value 0.13838
scoring_system epss
scoring_elements 0.94284
published_at 2026-04-08T12:55:00Z
7
value 0.13838
scoring_system epss
scoring_elements 0.94274
published_at 2026-04-07T12:55:00Z
8
value 0.13838
scoring_system epss
scoring_elements 0.94262
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28281
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072560
reference_id 2072560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072560
13
reference_url https://security.archlinux.org/AVG-2711
reference_id AVG-2711
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2711
14
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
15
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
reference_id mfsa2022-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-13/
reference_id mfsa2022-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/
url https://www.mozilla.org/security/advisories/mfsa2022-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-14/
reference_id mfsa2022-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/
url https://www.mozilla.org/security/advisories/mfsa2022-14/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-15/
reference_id mfsa2022-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/
url https://www.mozilla.org/security/advisories/mfsa2022-15/
23
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
24
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
25
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
26
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
27
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
28
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
29
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
30
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
31
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
32
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1755621
reference_id show_bug.cgi?id=1755621
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1755621
34
reference_url https://usn.ubuntu.com/5370-1/
reference_id USN-5370-1
reference_type
scores
url https://usn.ubuntu.com/5370-1/
35
reference_url https://usn.ubuntu.com/5393-1/
reference_id USN-5393-1
reference_type
scores
url https://usn.ubuntu.com/5393-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-28281
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-59up-n66e-fyhx
2
url VCID-hsr3-c152-nucq
vulnerability_id VCID-hsr3-c152-nucq
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28286.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28286.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28286
reference_id
reference_type
scores
0
value 0.00194
scoring_system epss
scoring_elements 0.41346
published_at 2026-04-04T12:55:00Z
1
value 0.00194
scoring_system epss
scoring_elements 0.41351
published_at 2026-04-16T12:55:00Z
2
value 0.00194
scoring_system epss
scoring_elements 0.41307
published_at 2026-04-13T12:55:00Z
3
value 0.00194
scoring_system epss
scoring_elements 0.41321
published_at 2026-04-12T12:55:00Z
4
value 0.00194
scoring_system epss
scoring_elements 0.41352
published_at 2026-04-11T12:55:00Z
5
value 0.00194
scoring_system epss
scoring_elements 0.41331
published_at 2026-04-09T12:55:00Z
6
value 0.00194
scoring_system epss
scoring_elements 0.41323
published_at 2026-04-08T12:55:00Z
7
value 0.00194
scoring_system epss
scoring_elements 0.41272
published_at 2026-04-07T12:55:00Z
8
value 0.00194
scoring_system epss
scoring_elements 0.41318
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28286
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072564
reference_id 2072564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072564
13
reference_url https://security.archlinux.org/AVG-2711
reference_id AVG-2711
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2711
14
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
15
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
reference_id mfsa2022-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-13/
reference_id mfsa2022-13
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/
url https://www.mozilla.org/security/advisories/mfsa2022-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-14/
reference_id mfsa2022-14
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/
url https://www.mozilla.org/security/advisories/mfsa2022-14/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-15/
reference_id mfsa2022-15
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/
url https://www.mozilla.org/security/advisories/mfsa2022-15/
23
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
24
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
25
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
26
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
27
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
28
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
29
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
30
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
31
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
32
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735265
reference_id show_bug.cgi?id=1735265
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735265
34
reference_url https://usn.ubuntu.com/5370-1/
reference_id USN-5370-1
reference_type
scores
url https://usn.ubuntu.com/5370-1/
35
reference_url https://usn.ubuntu.com/5393-1/
reference_id USN-5393-1
reference_type
scores
url https://usn.ubuntu.com/5393-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-28286
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hsr3-c152-nucq
3
url VCID-mw9j-h66p-k7as
vulnerability_id VCID-mw9j-h66p-k7as
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28289.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28289.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28289
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58909
published_at 2026-04-04T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.5895
published_at 2026-04-16T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58915
published_at 2026-04-13T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58934
published_at 2026-04-12T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58952
published_at 2026-04-11T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.58933
published_at 2026-04-09T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58928
published_at 2026-04-08T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.58876
published_at 2026-04-07T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58887
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28289
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072566
reference_id 2072566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072566
13
reference_url https://security.archlinux.org/AVG-2711
reference_id AVG-2711
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2711
14
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
15
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776
reference_id buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776
16
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
reference_id mfsa2022-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-13/
reference_id mfsa2022-13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/
url https://www.mozilla.org/security/advisories/mfsa2022-13/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-14/
reference_id mfsa2022-14
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/
url https://www.mozilla.org/security/advisories/mfsa2022-14/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-15/
reference_id mfsa2022-15
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/
url https://www.mozilla.org/security/advisories/mfsa2022-15/
24
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
25
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
26
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
27
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
28
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
29
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
30
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
31
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
32
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
33
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
34
reference_url https://usn.ubuntu.com/5370-1/
reference_id USN-5370-1
reference_type
scores
url https://usn.ubuntu.com/5370-1/
35
reference_url https://usn.ubuntu.com/5393-1/
reference_id USN-5393-1
reference_type
scores
url https://usn.ubuntu.com/5393-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-28289
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mw9j-h66p-k7as
4
url VCID-r631-9h74-sygv
vulnerability_id VCID-r631-9h74-sygv
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28282.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28282
reference_id
reference_type
scores
0
value 0.05281
scoring_system epss
scoring_elements 0.89979
published_at 2026-04-04T12:55:00Z
1
value 0.05281
scoring_system epss
scoring_elements 0.90023
published_at 2026-04-16T12:55:00Z
2
value 0.05281
scoring_system epss
scoring_elements 0.90007
published_at 2026-04-13T12:55:00Z
3
value 0.05281
scoring_system epss
scoring_elements 0.90013
published_at 2026-04-12T12:55:00Z
4
value 0.05281
scoring_system epss
scoring_elements 0.90015
published_at 2026-04-11T12:55:00Z
5
value 0.05281
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-09T12:55:00Z
6
value 0.05281
scoring_system epss
scoring_elements 0.90001
published_at 2026-04-08T12:55:00Z
7
value 0.05281
scoring_system epss
scoring_elements 0.89985
published_at 2026-04-07T12:55:00Z
8
value 0.05281
scoring_system epss
scoring_elements 0.89967
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072562
reference_id 2072562
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072562
13
reference_url https://security.archlinux.org/AVG-2711
reference_id AVG-2711
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2711
14
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
15
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
reference_id mfsa2022-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-13/
reference_id mfsa2022-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/
url https://www.mozilla.org/security/advisories/mfsa2022-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-14/
reference_id mfsa2022-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/
url https://www.mozilla.org/security/advisories/mfsa2022-14/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-15/
reference_id mfsa2022-15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/
url https://www.mozilla.org/security/advisories/mfsa2022-15/
23
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
24
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
25
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
26
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
27
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
28
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
29
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
30
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
31
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
32
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1751609
reference_id show_bug.cgi?id=1751609
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1751609
34
reference_url https://usn.ubuntu.com/5370-1/
reference_id USN-5370-1
reference_type
scores
url https://usn.ubuntu.com/5370-1/
35
reference_url https://usn.ubuntu.com/5393-1/
reference_id USN-5393-1
reference_type
scores
url https://usn.ubuntu.com/5393-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-28282
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r631-9h74-sygv
5
url VCID-t98b-d1uu-pkan
vulnerability_id VCID-t98b-d1uu-pkan
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1196.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1196.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1196
reference_id
reference_type
scores
0
value 0.00197
scoring_system epss
scoring_elements 0.41684
published_at 2026-04-07T12:55:00Z
1
value 0.00197
scoring_system epss
scoring_elements 0.41732
published_at 2026-04-12T12:55:00Z
2
value 0.00197
scoring_system epss
scoring_elements 0.41765
published_at 2026-04-16T12:55:00Z
3
value 0.00197
scoring_system epss
scoring_elements 0.41742
published_at 2026-04-09T12:55:00Z
4
value 0.00197
scoring_system epss
scoring_elements 0.41757
published_at 2026-04-04T12:55:00Z
5
value 0.00197
scoring_system epss
scoring_elements 0.41734
published_at 2026-04-08T12:55:00Z
6
value 0.00197
scoring_system epss
scoring_elements 0.41645
published_at 2026-04-01T12:55:00Z
7
value 0.00197
scoring_system epss
scoring_elements 0.41729
published_at 2026-04-02T12:55:00Z
8
value 0.00197
scoring_system epss
scoring_elements 0.41718
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1196
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072561
reference_id 2072561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072561
13
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
14
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
15
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-14/
reference_id mfsa2022-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-14/
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-15/
reference_id mfsa2022-15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-15/
20
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
21
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
22
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
23
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
24
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
25
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
26
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
27
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
28
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
29
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
30
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1750679
reference_id show_bug.cgi?id=1750679
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1750679
31
reference_url https://usn.ubuntu.com/5393-1/
reference_id USN-5393-1
reference_type
scores
url https://usn.ubuntu.com/5393-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-1196
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t98b-d1uu-pkan
6
url VCID-vpd3-v3fr-hkdm
vulnerability_id VCID-vpd3-v3fr-hkdm
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28285.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28285.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-28285
reference_id
reference_type
scores
0
value 0.00255
scoring_system epss
scoring_elements 0.48875
published_at 2026-04-04T12:55:00Z
1
value 0.00255
scoring_system epss
scoring_elements 0.48927
published_at 2026-04-16T12:55:00Z
2
value 0.00255
scoring_system epss
scoring_elements 0.48879
published_at 2026-04-13T12:55:00Z
3
value 0.00255
scoring_system epss
scoring_elements 0.48871
published_at 2026-04-12T12:55:00Z
4
value 0.00255
scoring_system epss
scoring_elements 0.48897
published_at 2026-04-11T12:55:00Z
5
value 0.00255
scoring_system epss
scoring_elements 0.4888
published_at 2026-04-09T12:55:00Z
6
value 0.00255
scoring_system epss
scoring_elements 0.48883
published_at 2026-04-08T12:55:00Z
7
value 0.00255
scoring_system epss
scoring_elements 0.48829
published_at 2026-04-07T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48849
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-28285
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072563
reference_id 2072563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072563
13
reference_url https://security.archlinux.org/AVG-2711
reference_id AVG-2711
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2711
14
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
15
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
url https://security.gentoo.org/glsa/202208-08
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
reference_id mfsa2022-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-13/
reference_id mfsa2022-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/
url https://www.mozilla.org/security/advisories/mfsa2022-13/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-14/
reference_id mfsa2022-14
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/
url https://www.mozilla.org/security/advisories/mfsa2022-14/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-15/
reference_id mfsa2022-15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/
url https://www.mozilla.org/security/advisories/mfsa2022-15/
23
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
24
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
25
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
26
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
27
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
28
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
29
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
30
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
31
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
32
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1756957
reference_id show_bug.cgi?id=1756957
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1756957
34
reference_url https://usn.ubuntu.com/5370-1/
reference_id USN-5370-1
reference_type
scores
url https://usn.ubuntu.com/5370-1/
35
reference_url https://usn.ubuntu.com/5393-1/
reference_id USN-5393-1
reference_type
scores
url https://usn.ubuntu.com/5393-1/
36
reference_url https://usn.ubuntu.com/5494-1/
reference_id USN-5494-1
reference_type
scores
url https://usn.ubuntu.com/5494-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-28285
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpd3-v3fr-hkdm
7
url VCID-wsdd-t7d2-gbda
vulnerability_id VCID-wsdd-t7d2-gbda
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24713.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-24713
reference_id
reference_type
scores
0
value 0.0985
scoring_system epss
scoring_elements 0.92967
published_at 2026-04-04T12:55:00Z
1
value 0.0985
scoring_system epss
scoring_elements 0.92963
published_at 2026-04-02T12:55:00Z
2
value 0.10916
scoring_system epss
scoring_elements 0.93415
published_at 2026-04-16T12:55:00Z
3
value 0.11247
scoring_system epss
scoring_elements 0.93505
published_at 2026-04-09T12:55:00Z
4
value 0.11247
scoring_system epss
scoring_elements 0.93509
published_at 2026-04-12T12:55:00Z
5
value 0.11247
scoring_system epss
scoring_elements 0.9351
published_at 2026-04-13T12:55:00Z
6
value 0.11247
scoring_system epss
scoring_elements 0.93502
published_at 2026-04-08T12:55:00Z
7
value 0.11247
scoring_system epss
scoring_elements 0.93494
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-24713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://github.com/rust-lang/regex
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rust-lang/regex
13
reference_url https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e
14
reference_url https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8
15
reference_url https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw
16
reference_url https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html
17
reference_url https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-24713
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-24713
25
reference_url https://rustsec.org/advisories/RUSTSEC-2022-0013.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2022-0013.html
26
reference_url https://www.debian.org/security/2022/dsa-5113
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://www.debian.org/security/2022/dsa-5113
27
reference_url https://www.debian.org/security/2022/dsa-5118
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://www.debian.org/security/2022/dsa-5118
28
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007176
reference_id 1007176
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007176
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2072565
reference_id 2072565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2072565
30
reference_url https://security.archlinux.org/AVG-2711
reference_id AVG-2711
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2711
31
reference_url https://security.archlinux.org/AVG-2712
reference_id AVG-2712
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2712
32
reference_url https://github.com/advisories/GHSA-m5pq-gvj9-9vr8
reference_id GHSA-m5pq-gvj9-9vr8
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-m5pq-gvj9-9vr8
33
reference_url https://security.gentoo.org/glsa/202208-08
reference_id GLSA-202208-08
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://security.gentoo.org/glsa/202208-08
34
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://security.gentoo.org/glsa/202208-14
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/
reference_id JANLZ3JXWJR7FSHE57K66UIZUIJZI67T
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/
36
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
reference_id mfsa2022-13
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-13
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
reference_id mfsa2022-14
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-14
38
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
reference_id mfsa2022-15
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-15
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/
reference_id O3YB7CURSG64CIPCDPNMGPE4UU24AB6H
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/
reference_id PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/
41
reference_url https://access.redhat.com/errata/RHSA-2022:1283
reference_id RHSA-2022:1283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1283
42
reference_url https://access.redhat.com/errata/RHSA-2022:1284
reference_id RHSA-2022:1284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1284
43
reference_url https://access.redhat.com/errata/RHSA-2022:1285
reference_id RHSA-2022:1285
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1285
44
reference_url https://access.redhat.com/errata/RHSA-2022:1286
reference_id RHSA-2022:1286
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1286
45
reference_url https://access.redhat.com/errata/RHSA-2022:1287
reference_id RHSA-2022:1287
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1287
46
reference_url https://access.redhat.com/errata/RHSA-2022:1301
reference_id RHSA-2022:1301
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1301
47
reference_url https://access.redhat.com/errata/RHSA-2022:1302
reference_id RHSA-2022:1302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1302
48
reference_url https://access.redhat.com/errata/RHSA-2022:1303
reference_id RHSA-2022:1303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1303
49
reference_url https://access.redhat.com/errata/RHSA-2022:1305
reference_id RHSA-2022:1305
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1305
50
reference_url https://access.redhat.com/errata/RHSA-2022:1326
reference_id RHSA-2022:1326
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1326
51
reference_url https://usn.ubuntu.com/5370-1/
reference_id USN-5370-1
reference_type
scores
url https://usn.ubuntu.com/5370-1/
52
reference_url https://usn.ubuntu.com/5610-1/
reference_id USN-5610-1
reference_type
scores
url https://usn.ubuntu.com/5610-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
purl pkg:apk/alpine/firefox-esr@91.8.0-r0?arch=armhf&distroversion=v3.16&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community
aliases CVE-2022-24713, GHSA-m5pq-gvj9-9vr8
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wsdd-t7d2-gbda
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@91.8.0-r0%3Farch=armhf&distroversion=v3.16&reponame=community