Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
Typeapk
Namespacealpine
Namethunderbird
Version91.5.0-r0
Qualifiers
arch aarch64
distroversion v3.17
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version91.6.0-r0
Latest_non_vulnerable_version102.1.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1phe-59fw-9qdt
vulnerability_id VCID-1phe-59fw-9qdt
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22739.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22739
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63432
published_at 2026-04-13T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63468
published_at 2026-04-12T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63404
published_at 2026-04-02T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63483
published_at 2026-04-11T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.63466
published_at 2026-04-09T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63448
published_at 2026-04-08T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.63431
published_at 2026-04-04T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63397
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22739
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039573
reference_id 2039573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039573
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1744158
reference_id show_bug.cgi?id=1744158
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1744158
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22739
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1phe-59fw-9qdt
1
url VCID-6f7n-yr9x-8fbw
vulnerability_id VCID-6f7n-yr9x-8fbw
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22751.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22751
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.6726
published_at 2026-04-13T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67295
published_at 2026-04-12T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67223
published_at 2026-04-02T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67308
published_at 2026-04-11T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-09T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67275
published_at 2026-04-08T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.67247
published_at 2026-04-04T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67224
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039574
reference_id 2039574
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039574
15
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011
reference_id buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011
16
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
25
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
26
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
27
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
28
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
29
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
30
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
31
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
32
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
33
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22751
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6f7n-yr9x-8fbw
2
url VCID-8enx-7aa9-cqd3
vulnerability_id VCID-8enx-7aa9-cqd3
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22737.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22737
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60371
published_at 2026-04-13T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.6039
published_at 2026-04-12T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60323
published_at 2026-04-02T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60404
published_at 2026-04-11T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60383
published_at 2026-04-09T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60367
published_at 2026-04-08T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.6035
published_at 2026-04-04T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039567
reference_id 2039567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039567
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1745874
reference_id show_bug.cgi?id=1745874
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1745874
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22737
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8enx-7aa9-cqd3
3
url VCID-d194-2uh4-pug1
vulnerability_id VCID-d194-2uh4-pug1
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22743.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22743
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62289
published_at 2026-04-13T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62311
published_at 2026-04-12T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62238
published_at 2026-04-02T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62321
published_at 2026-04-11T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62301
published_at 2026-04-09T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62284
published_at 2026-04-08T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62268
published_at 2026-04-04T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62234
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039561
reference_id 2039561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039561
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1739220
reference_id show_bug.cgi?id=1739220
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1739220
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d194-2uh4-pug1
4
url VCID-d9vf-maye-6ff7
vulnerability_id VCID-d9vf-maye-6ff7
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22745.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22745
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64419
published_at 2026-04-13T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64448
published_at 2026-04-12T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64394
published_at 2026-04-02T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-11T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64447
published_at 2026-04-09T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64432
published_at 2026-04-08T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64423
published_at 2026-04-04T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64383
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039570
reference_id 2039570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039570
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735856
reference_id show_bug.cgi?id=1735856
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735856
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22745
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9vf-maye-6ff7
5
url VCID-hn17-6nvj-9qfw
vulnerability_id VCID-hn17-6nvj-9qfw
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22738.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22738
reference_id
reference_type
scores
0
value 0.0051
scoring_system epss
scoring_elements 0.66403
published_at 2026-04-13T12:55:00Z
1
value 0.0051
scoring_system epss
scoring_elements 0.66434
published_at 2026-04-12T12:55:00Z
2
value 0.0051
scoring_system epss
scoring_elements 0.66368
published_at 2026-04-02T12:55:00Z
3
value 0.0051
scoring_system epss
scoring_elements 0.66446
published_at 2026-04-11T12:55:00Z
4
value 0.0051
scoring_system epss
scoring_elements 0.66426
published_at 2026-04-09T12:55:00Z
5
value 0.0051
scoring_system epss
scoring_elements 0.66412
published_at 2026-04-08T12:55:00Z
6
value 0.0051
scoring_system epss
scoring_elements 0.66394
published_at 2026-04-04T12:55:00Z
7
value 0.0051
scoring_system epss
scoring_elements 0.66364
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22738
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039566
reference_id 2039566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039566
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1742382
reference_id show_bug.cgi?id=1742382
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1742382
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22738
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hn17-6nvj-9qfw
6
url VCID-mzbp-5r6m-27cm
vulnerability_id VCID-mzbp-5r6m-27cm
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22740.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22740
reference_id
reference_type
scores
0
value 0.00269
scoring_system epss
scoring_elements 0.50417
published_at 2026-04-12T12:55:00Z
1
value 0.00269
scoring_system epss
scoring_elements 0.5044
published_at 2026-04-11T12:55:00Z
2
value 0.00269
scoring_system epss
scoring_elements 0.50374
published_at 2026-04-02T12:55:00Z
3
value 0.00269
scoring_system epss
scoring_elements 0.50399
published_at 2026-04-09T12:55:00Z
4
value 0.00269
scoring_system epss
scoring_elements 0.50406
published_at 2026-04-08T12:55:00Z
5
value 0.00269
scoring_system epss
scoring_elements 0.50403
published_at 2026-04-13T12:55:00Z
6
value 0.00269
scoring_system epss
scoring_elements 0.50353
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039565
reference_id 2039565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039565
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1742334
reference_id show_bug.cgi?id=1742334
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1742334
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22740
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mzbp-5r6m-27cm
7
url VCID-n796-xf5e-pucq
vulnerability_id VCID-n796-xf5e-pucq
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4140.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4140
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18397
published_at 2026-04-04T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18188
published_at 2026-04-01T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18344
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19942
published_at 2026-04-08T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19862
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20016
published_at 2026-04-11T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.19996
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19971
published_at 2026-04-12T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19913
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039568
reference_id 2039568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039568
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1746720
reference_id show_bug.cgi?id=1746720
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1746720
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2021-4140
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n796-xf5e-pucq
8
url VCID-qgvp-4eea-bkgm
vulnerability_id VCID-qgvp-4eea-bkgm
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22748.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22748.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22748
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63432
published_at 2026-04-13T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63467
published_at 2026-04-12T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63404
published_at 2026-04-02T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63483
published_at 2026-04-11T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.63466
published_at 2026-04-09T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63448
published_at 2026-04-08T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.63431
published_at 2026-04-04T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63397
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22748
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039569
reference_id 2039569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039569
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1705211
reference_id show_bug.cgi?id=1705211
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1705211
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22748
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgvp-4eea-bkgm
9
url VCID-rsy6-acfe-ffb5
vulnerability_id VCID-rsy6-acfe-ffb5
summary The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.*This bug only affects Firefox for Windows. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22744.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22744
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63329
published_at 2026-04-13T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63382
published_at 2026-04-11T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63302
published_at 2026-04-02T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63365
published_at 2026-04-12T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63347
published_at 2026-04-08T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.6333
published_at 2026-04-04T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.63296
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22744
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039571
reference_id 2039571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039571
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
4
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
6
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1737252
reference_id show_bug.cgi?id=1737252
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1737252
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22744
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rsy6-acfe-ffb5
10
url VCID-tnxh-tgsm-tuex
vulnerability_id VCID-tnxh-tgsm-tuex
summary A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.*This bug only affects Firefox for Windows. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22746.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22746
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30979
published_at 2026-04-13T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31024
published_at 2026-04-12T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31111
published_at 2026-04-02T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.31068
published_at 2026-04-11T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31062
published_at 2026-04-09T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31033
published_at 2026-04-08T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31158
published_at 2026-04-04T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.30976
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22746
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039560
reference_id 2039560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039560
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
4
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
6
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735071
reference_id show_bug.cgi?id=1735071
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735071
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22746
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tnxh-tgsm-tuex
11
url VCID-xp3b-fyfq-xbbq
vulnerability_id VCID-xp3b-fyfq-xbbq
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22741.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22741
reference_id
reference_type
scores
0
value 0.00463
scoring_system epss
scoring_elements 0.64302
published_at 2026-04-13T12:55:00Z
1
value 0.00463
scoring_system epss
scoring_elements 0.64331
published_at 2026-04-12T12:55:00Z
2
value 0.00463
scoring_system epss
scoring_elements 0.64281
published_at 2026-04-02T12:55:00Z
3
value 0.00463
scoring_system epss
scoring_elements 0.64342
published_at 2026-04-11T12:55:00Z
4
value 0.00463
scoring_system epss
scoring_elements 0.64329
published_at 2026-04-09T12:55:00Z
5
value 0.00463
scoring_system epss
scoring_elements 0.64315
published_at 2026-04-08T12:55:00Z
6
value 0.00463
scoring_system epss
scoring_elements 0.64309
published_at 2026-04-04T12:55:00Z
7
value 0.00463
scoring_system epss
scoring_elements 0.64266
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039564
reference_id 2039564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039564
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1740389
reference_id show_bug.cgi?id=1740389
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1740389
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22741
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xp3b-fyfq-xbbq
12
url VCID-y43f-tmvr-hqas
vulnerability_id VCID-y43f-tmvr-hqas
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32419
published_at 2026-04-13T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32446
published_at 2026-04-12T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32582
published_at 2026-04-04T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32546
published_at 2026-04-02T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32485
published_at 2026-04-11T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.3248
published_at 2026-04-09T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32406
published_at 2026-04-07T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
reference_id 2039572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
16
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
25
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
26
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
27
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
28
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
29
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
30
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
31
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
32
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
33
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
reference_id show_bug.cgi?id=1735028
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
35
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
36
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
37
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
38
reference_url https://usn.ubuntu.com/5506-1/
reference_id USN-5506-1
reference_type
scores
url https://usn.ubuntu.com/5506-1/
39
reference_url https://usn.ubuntu.com/5872-1/
reference_id USN-5872-1
reference_type
scores
url https://usn.ubuntu.com/5872-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22747
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y43f-tmvr-hqas
13
url VCID-y7wn-9j43-jba3
vulnerability_id VCID-y7wn-9j43-jba3
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22742.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22742
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54893
published_at 2026-04-13T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54916
published_at 2026-04-12T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54878
published_at 2026-04-02T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54934
published_at 2026-04-11T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54922
published_at 2026-04-09T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-08T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54904
published_at 2026-04-04T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54873
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039563
reference_id 2039563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039563
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1739923
reference_id show_bug.cgi?id=1739923
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1739923
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/thunderbird@91.5.0-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2022-22742
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7wn-9j43-jba3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/thunderbird@91.5.0-r0%3Farch=aarch64&distroversion=v3.17&reponame=community