Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Namefirefox
Version97.0-r0
Qualifiers
arch armhf
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version97.0.2-r0
Latest_non_vulnerable_version119.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1phe-59fw-9qdt
vulnerability_id VCID-1phe-59fw-9qdt
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22739.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22739.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22739
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63465
published_at 2026-04-16T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63432
published_at 2026-04-13T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63404
published_at 2026-04-02T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63468
published_at 2026-04-12T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.63483
published_at 2026-04-11T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63466
published_at 2026-04-09T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.63448
published_at 2026-04-08T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63431
published_at 2026-04-04T12:55:00Z
8
value 0.00445
scoring_system epss
scoring_elements 0.63397
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22739
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039573
reference_id 2039573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039573
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1744158
reference_id show_bug.cgi?id=1744158
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:32:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1744158
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22739
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1phe-59fw-9qdt
1
url VCID-617s-c6y6-ube4
vulnerability_id VCID-617s-c6y6-ube4
summary Mozilla developers Christian Holler and Jason Kratzer reported memory safety bugs present in Firefox 95. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22752
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-16T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.5878
published_at 2026-04-02T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.5877
published_at 2026-04-07T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58822
published_at 2026-04-08T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58829
published_at 2026-04-12T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58847
published_at 2026-04-11T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.5881
published_at 2026-04-13T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58801
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22752
1
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1741210%2C1742770
reference_id buglist.cgi?bug_id=1741210%2C1742770
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-18T14:14:31Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1741210%2C1742770
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-18T14:14:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
4
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22752
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-617s-c6y6-ube4
2
url VCID-6f7n-yr9x-8fbw
vulnerability_id VCID-6f7n-yr9x-8fbw
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22751.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22751
reference_id
reference_type
scores
0
value 0.00531
scoring_system epss
scoring_elements 0.6726
published_at 2026-04-13T12:55:00Z
1
value 0.00531
scoring_system epss
scoring_elements 0.67295
published_at 2026-04-16T12:55:00Z
2
value 0.00531
scoring_system epss
scoring_elements 0.67223
published_at 2026-04-02T12:55:00Z
3
value 0.00531
scoring_system epss
scoring_elements 0.67308
published_at 2026-04-11T12:55:00Z
4
value 0.00531
scoring_system epss
scoring_elements 0.67289
published_at 2026-04-09T12:55:00Z
5
value 0.00531
scoring_system epss
scoring_elements 0.67275
published_at 2026-04-08T12:55:00Z
6
value 0.00531
scoring_system epss
scoring_elements 0.67247
published_at 2026-04-04T12:55:00Z
7
value 0.00531
scoring_system epss
scoring_elements 0.67224
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039574
reference_id 2039574
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039574
15
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011
reference_id buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664149%2C1737816%2C1739366%2C1740274%2C1740797%2C1741201%2C1741869%2C1743221%2C1743515%2C1745373%2C1746011
16
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:49:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
25
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
26
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
27
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
28
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
29
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
30
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
31
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
32
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
33
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22751
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6f7n-yr9x-8fbw
3
url VCID-71rh-2xhf-euf8
vulnerability_id VCID-71rh-2xhf-euf8
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0511
reference_id
reference_type
scores
0
value 0.00371
scoring_system epss
scoring_elements 0.58948
published_at 2026-04-16T12:55:00Z
1
value 0.00371
scoring_system epss
scoring_elements 0.58811
published_at 2026-04-01T12:55:00Z
2
value 0.00371
scoring_system epss
scoring_elements 0.58885
published_at 2026-04-02T12:55:00Z
3
value 0.00371
scoring_system epss
scoring_elements 0.58926
published_at 2026-04-08T12:55:00Z
4
value 0.00371
scoring_system epss
scoring_elements 0.58932
published_at 2026-04-09T12:55:00Z
5
value 0.00371
scoring_system epss
scoring_elements 0.5895
published_at 2026-04-11T12:55:00Z
6
value 0.00371
scoring_system epss
scoring_elements 0.58933
published_at 2026-04-12T12:55:00Z
7
value 0.00371
scoring_system epss
scoring_elements 0.58914
published_at 2026-04-13T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58907
published_at 2026-04-04T12:55:00Z
9
value 0.00371
scoring_system epss
scoring_elements 0.58875
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0511
1
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:37:43Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
4
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-0511
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71rh-2xhf-euf8
4
url VCID-84nu-ma7v-efd1
vulnerability_id VCID-84nu-ma7v-efd1
summary When scanning QR codes, Firefox for Android would have allowed navigation to some URLs that do not point to web content.*This bug only affects Firefox for Android. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22749
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.5408
published_at 2026-04-16T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.53975
published_at 2026-04-02T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53978
published_at 2026-04-07T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.5403
published_at 2026-04-09T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.54076
published_at 2026-04-11T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.54058
published_at 2026-04-12T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.5404
published_at 2026-04-13T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54002
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22749
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
2
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:51:30Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1705094
reference_id show_bug.cgi?id=1705094
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:51:30Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1705094
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22749
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84nu-ma7v-efd1
5
url VCID-89kx-fdvr-73cs
vulnerability_id VCID-89kx-fdvr-73cs
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22754.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22754.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22754
reference_id
reference_type
scores
0
value 0.00032
scoring_system epss
scoring_elements 0.09123
published_at 2026-04-04T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09153
published_at 2026-04-11T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09152
published_at 2026-04-09T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09122
published_at 2026-04-08T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09043
published_at 2026-04-07T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.0907
published_at 2026-04-02T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09001
published_at 2026-04-16T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09106
published_at 2026-04-13T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09121
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22754
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053236
reference_id 2053236
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053236
10
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
11
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:44:24Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
reference_id mfsa2022-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-05/
reference_id mfsa2022-05
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:44:24Z/
url https://www.mozilla.org/security/advisories/mfsa2022-05/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
reference_id mfsa2022-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-06/
reference_id mfsa2022-06
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:44:24Z/
url https://www.mozilla.org/security/advisories/mfsa2022-06/
18
reference_url https://access.redhat.com/errata/RHSA-2022:0510
reference_id RHSA-2022:0510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0510
19
reference_url https://access.redhat.com/errata/RHSA-2022:0511
reference_id RHSA-2022:0511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0511
20
reference_url https://access.redhat.com/errata/RHSA-2022:0512
reference_id RHSA-2022:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0512
21
reference_url https://access.redhat.com/errata/RHSA-2022:0513
reference_id RHSA-2022:0513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0513
22
reference_url https://access.redhat.com/errata/RHSA-2022:0514
reference_id RHSA-2022:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0514
23
reference_url https://access.redhat.com/errata/RHSA-2022:0535
reference_id RHSA-2022:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0535
24
reference_url https://access.redhat.com/errata/RHSA-2022:0536
reference_id RHSA-2022:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0536
25
reference_url https://access.redhat.com/errata/RHSA-2022:0537
reference_id RHSA-2022:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0537
26
reference_url https://access.redhat.com/errata/RHSA-2022:0538
reference_id RHSA-2022:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0538
27
reference_url https://access.redhat.com/errata/RHSA-2022:0539
reference_id RHSA-2022:0539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0539
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1750565
reference_id show_bug.cgi?id=1750565
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:44:24Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1750565
29
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
30
reference_url https://usn.ubuntu.com/5345-1/
reference_id USN-5345-1
reference_type
scores
url https://usn.ubuntu.com/5345-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22754
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89kx-fdvr-73cs
6
url VCID-8dfd-mq2b-bqg5
vulnerability_id VCID-8dfd-mq2b-bqg5
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22757
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.41123
published_at 2026-04-16T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.41097
published_at 2026-04-12T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41055
published_at 2026-04-07T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.41103
published_at 2026-04-08T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.41111
published_at 2026-04-09T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.41131
published_at 2026-04-11T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.4108
published_at 2026-04-13T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.41128
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22757
1
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:31:34Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1720098
reference_id show_bug.cgi?id=1720098
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:31:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1720098
5
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22757
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8dfd-mq2b-bqg5
7
url VCID-8enx-7aa9-cqd3
vulnerability_id VCID-8enx-7aa9-cqd3
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22737.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22737.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22737
reference_id
reference_type
scores
0
value 0.00395
scoring_system epss
scoring_elements 0.60412
published_at 2026-04-16T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60371
published_at 2026-04-13T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60323
published_at 2026-04-02T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.6039
published_at 2026-04-12T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60404
published_at 2026-04-11T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60383
published_at 2026-04-09T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60367
published_at 2026-04-08T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.6035
published_at 2026-04-04T12:55:00Z
8
value 0.00395
scoring_system epss
scoring_elements 0.60318
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22737
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039567
reference_id 2039567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039567
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1745874
reference_id show_bug.cgi?id=1745874
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:08:04Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1745874
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22737
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8enx-7aa9-cqd3
8
url VCID-b828-9v26-aqbv
vulnerability_id VCID-b828-9v26-aqbv
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22755
reference_id
reference_type
scores
0
value 0.00761
scoring_system epss
scoring_elements 0.73392
published_at 2026-04-16T12:55:00Z
1
value 0.00761
scoring_system epss
scoring_elements 0.73307
published_at 2026-04-02T12:55:00Z
2
value 0.00761
scoring_system epss
scoring_elements 0.7334
published_at 2026-04-08T12:55:00Z
3
value 0.00761
scoring_system epss
scoring_elements 0.73354
published_at 2026-04-09T12:55:00Z
4
value 0.00761
scoring_system epss
scoring_elements 0.73378
published_at 2026-04-11T12:55:00Z
5
value 0.00761
scoring_system epss
scoring_elements 0.73357
published_at 2026-04-12T12:55:00Z
6
value 0.00761
scoring_system epss
scoring_elements 0.7335
published_at 2026-04-13T12:55:00Z
7
value 0.00761
scoring_system epss
scoring_elements 0.73331
published_at 2026-04-04T12:55:00Z
8
value 0.00761
scoring_system epss
scoring_elements 0.73304
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22755
1
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:40:45Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1309630
reference_id show_bug.cgi?id=1309630
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:40:45Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1309630
5
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22755
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b828-9v26-aqbv
9
url VCID-d194-2uh4-pug1
vulnerability_id VCID-d194-2uh4-pug1
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22743.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22743.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22743
reference_id
reference_type
scores
0
value 0.00427
scoring_system epss
scoring_elements 0.62335
published_at 2026-04-16T12:55:00Z
1
value 0.00427
scoring_system epss
scoring_elements 0.62289
published_at 2026-04-13T12:55:00Z
2
value 0.00427
scoring_system epss
scoring_elements 0.62238
published_at 2026-04-02T12:55:00Z
3
value 0.00427
scoring_system epss
scoring_elements 0.62311
published_at 2026-04-12T12:55:00Z
4
value 0.00427
scoring_system epss
scoring_elements 0.62321
published_at 2026-04-11T12:55:00Z
5
value 0.00427
scoring_system epss
scoring_elements 0.62301
published_at 2026-04-09T12:55:00Z
6
value 0.00427
scoring_system epss
scoring_elements 0.62284
published_at 2026-04-08T12:55:00Z
7
value 0.00427
scoring_system epss
scoring_elements 0.62268
published_at 2026-04-04T12:55:00Z
8
value 0.00427
scoring_system epss
scoring_elements 0.62234
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22743
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039561
reference_id 2039561
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039561
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1739220
reference_id show_bug.cgi?id=1739220
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:30:49Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1739220
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22743
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d194-2uh4-pug1
10
url VCID-d9vf-maye-6ff7
vulnerability_id VCID-d9vf-maye-6ff7
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22745.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22745
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64454
published_at 2026-04-16T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64419
published_at 2026-04-13T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64394
published_at 2026-04-02T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64448
published_at 2026-04-12T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.6446
published_at 2026-04-11T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64447
published_at 2026-04-09T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64432
published_at 2026-04-08T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64423
published_at 2026-04-04T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64383
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039570
reference_id 2039570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039570
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735856
reference_id show_bug.cgi?id=1735856
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:02:51Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735856
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22745
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d9vf-maye-6ff7
11
url VCID-eyrw-5dmv-pqfe
vulnerability_id VCID-eyrw-5dmv-pqfe
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22764.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22764.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22764
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47042
published_at 2026-04-04T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47065
published_at 2026-04-11T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47041
published_at 2026-04-09T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47044
published_at 2026-04-13T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.4699
published_at 2026-04-07T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47023
published_at 2026-04-02T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47101
published_at 2026-04-16T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47038
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22764
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053243
reference_id 2053243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053243
10
reference_url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1742682%2C1744165%2C1746545%2C1748210%2C1748279
reference_id buglist.cgi?bug_id=1742682%2C1744165%2C1746545%2C1748210%2C1748279
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:28:33Z/
url https://bugzilla.mozilla.org/buglist.cgi?bug_id=1742682%2C1744165%2C1746545%2C1748210%2C1748279
11
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
12
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
14
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:28:33Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
15
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
reference_id mfsa2022-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
16
reference_url https://www.mozilla.org/security/advisories/mfsa2022-05/
reference_id mfsa2022-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:28:33Z/
url https://www.mozilla.org/security/advisories/mfsa2022-05/
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
reference_id mfsa2022-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-06/
reference_id mfsa2022-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:28:33Z/
url https://www.mozilla.org/security/advisories/mfsa2022-06/
19
reference_url https://access.redhat.com/errata/RHSA-2022:0510
reference_id RHSA-2022:0510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0510
20
reference_url https://access.redhat.com/errata/RHSA-2022:0511
reference_id RHSA-2022:0511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0511
21
reference_url https://access.redhat.com/errata/RHSA-2022:0512
reference_id RHSA-2022:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0512
22
reference_url https://access.redhat.com/errata/RHSA-2022:0513
reference_id RHSA-2022:0513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0513
23
reference_url https://access.redhat.com/errata/RHSA-2022:0514
reference_id RHSA-2022:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0514
24
reference_url https://access.redhat.com/errata/RHSA-2022:0535
reference_id RHSA-2022:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0535
25
reference_url https://access.redhat.com/errata/RHSA-2022:0536
reference_id RHSA-2022:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0536
26
reference_url https://access.redhat.com/errata/RHSA-2022:0537
reference_id RHSA-2022:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0537
27
reference_url https://access.redhat.com/errata/RHSA-2022:0538
reference_id RHSA-2022:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0538
28
reference_url https://access.redhat.com/errata/RHSA-2022:0539
reference_id RHSA-2022:0539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0539
29
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
30
reference_url https://usn.ubuntu.com/5345-1/
reference_id USN-5345-1
reference_type
scores
url https://usn.ubuntu.com/5345-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22764
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eyrw-5dmv-pqfe
12
url VCID-fa1y-hpcb-27gj
vulnerability_id VCID-fa1y-hpcb-27gj
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22760.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22760.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22760
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43451
published_at 2026-04-16T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.43392
published_at 2026-04-13T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.43389
published_at 2026-04-02T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.43407
published_at 2026-04-12T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.43438
published_at 2026-04-11T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.4342
published_at 2026-04-09T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43406
published_at 2026-04-08T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.43416
published_at 2026-04-04T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43355
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22760
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053238
reference_id 2053238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053238
10
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
11
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:35:05Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
reference_id mfsa2022-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-05/
reference_id mfsa2022-05
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:35:05Z/
url https://www.mozilla.org/security/advisories/mfsa2022-05/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
reference_id mfsa2022-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-06/
reference_id mfsa2022-06
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:35:05Z/
url https://www.mozilla.org/security/advisories/mfsa2022-06/
18
reference_url https://access.redhat.com/errata/RHSA-2022:0510
reference_id RHSA-2022:0510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0510
19
reference_url https://access.redhat.com/errata/RHSA-2022:0511
reference_id RHSA-2022:0511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0511
20
reference_url https://access.redhat.com/errata/RHSA-2022:0512
reference_id RHSA-2022:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0512
21
reference_url https://access.redhat.com/errata/RHSA-2022:0513
reference_id RHSA-2022:0513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0513
22
reference_url https://access.redhat.com/errata/RHSA-2022:0514
reference_id RHSA-2022:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0514
23
reference_url https://access.redhat.com/errata/RHSA-2022:0535
reference_id RHSA-2022:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0535
24
reference_url https://access.redhat.com/errata/RHSA-2022:0536
reference_id RHSA-2022:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0536
25
reference_url https://access.redhat.com/errata/RHSA-2022:0537
reference_id RHSA-2022:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0537
26
reference_url https://access.redhat.com/errata/RHSA-2022:0538
reference_id RHSA-2022:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0538
27
reference_url https://access.redhat.com/errata/RHSA-2022:0539
reference_id RHSA-2022:0539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0539
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1740985
reference_id show_bug.cgi?id=1740985
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:35:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1740985
29
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1748503
reference_id show_bug.cgi?id=1748503
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:35:05Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1748503
30
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
31
reference_url https://usn.ubuntu.com/5345-1/
reference_id USN-5345-1
reference_type
scores
url https://usn.ubuntu.com/5345-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22760
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fa1y-hpcb-27gj
13
url VCID-hn17-6nvj-9qfw
vulnerability_id VCID-hn17-6nvj-9qfw
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22738.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22738.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22738
reference_id
reference_type
scores
0
value 0.0051
scoring_system epss
scoring_elements 0.66439
published_at 2026-04-16T12:55:00Z
1
value 0.0051
scoring_system epss
scoring_elements 0.66403
published_at 2026-04-13T12:55:00Z
2
value 0.0051
scoring_system epss
scoring_elements 0.66368
published_at 2026-04-02T12:55:00Z
3
value 0.0051
scoring_system epss
scoring_elements 0.66434
published_at 2026-04-12T12:55:00Z
4
value 0.0051
scoring_system epss
scoring_elements 0.66446
published_at 2026-04-11T12:55:00Z
5
value 0.0051
scoring_system epss
scoring_elements 0.66426
published_at 2026-04-09T12:55:00Z
6
value 0.0051
scoring_system epss
scoring_elements 0.66412
published_at 2026-04-08T12:55:00Z
7
value 0.0051
scoring_system epss
scoring_elements 0.66394
published_at 2026-04-04T12:55:00Z
8
value 0.0051
scoring_system epss
scoring_elements 0.66364
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22738
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039566
reference_id 2039566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039566
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1742382
reference_id show_bug.cgi?id=1742382
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:06:50Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1742382
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22738
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hn17-6nvj-9qfw
14
url VCID-kpk1-e652-nkfa
vulnerability_id VCID-kpk1-e652-nkfa
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22761.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22761
reference_id
reference_type
scores
0
value 0.00281
scoring_system epss
scoring_elements 0.51446
published_at 2026-04-04T12:55:00Z
1
value 0.00281
scoring_system epss
scoring_elements 0.51499
published_at 2026-04-11T12:55:00Z
2
value 0.00281
scoring_system epss
scoring_elements 0.51457
published_at 2026-04-09T12:55:00Z
3
value 0.00281
scoring_system epss
scoring_elements 0.51459
published_at 2026-04-08T12:55:00Z
4
value 0.00281
scoring_system epss
scoring_elements 0.51405
published_at 2026-04-07T12:55:00Z
5
value 0.00281
scoring_system epss
scoring_elements 0.51419
published_at 2026-04-02T12:55:00Z
6
value 0.00281
scoring_system epss
scoring_elements 0.51508
published_at 2026-04-16T12:55:00Z
7
value 0.00281
scoring_system epss
scoring_elements 0.51465
published_at 2026-04-13T12:55:00Z
8
value 0.00281
scoring_system epss
scoring_elements 0.51478
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053239
reference_id 2053239
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053239
10
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
11
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:33:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
reference_id mfsa2022-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-05/
reference_id mfsa2022-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:33:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-05/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
reference_id mfsa2022-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-06/
reference_id mfsa2022-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:33:31Z/
url https://www.mozilla.org/security/advisories/mfsa2022-06/
18
reference_url https://access.redhat.com/errata/RHSA-2022:0510
reference_id RHSA-2022:0510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0510
19
reference_url https://access.redhat.com/errata/RHSA-2022:0511
reference_id RHSA-2022:0511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0511
20
reference_url https://access.redhat.com/errata/RHSA-2022:0512
reference_id RHSA-2022:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0512
21
reference_url https://access.redhat.com/errata/RHSA-2022:0513
reference_id RHSA-2022:0513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0513
22
reference_url https://access.redhat.com/errata/RHSA-2022:0514
reference_id RHSA-2022:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0514
23
reference_url https://access.redhat.com/errata/RHSA-2022:0535
reference_id RHSA-2022:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0535
24
reference_url https://access.redhat.com/errata/RHSA-2022:0536
reference_id RHSA-2022:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0536
25
reference_url https://access.redhat.com/errata/RHSA-2022:0537
reference_id RHSA-2022:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0537
26
reference_url https://access.redhat.com/errata/RHSA-2022:0538
reference_id RHSA-2022:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0538
27
reference_url https://access.redhat.com/errata/RHSA-2022:0539
reference_id RHSA-2022:0539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0539
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1745566
reference_id show_bug.cgi?id=1745566
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:33:31Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1745566
29
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
30
reference_url https://usn.ubuntu.com/5345-1/
reference_id USN-5345-1
reference_type
scores
url https://usn.ubuntu.com/5345-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22761
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kpk1-e652-nkfa
15
url VCID-mqte-f1hw-2ya5
vulnerability_id VCID-mqte-f1hw-2ya5
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22753.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22753
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61374
published_at 2026-04-04T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61427
published_at 2026-04-11T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61405
published_at 2026-04-09T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.6139
published_at 2026-04-08T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61343
published_at 2026-04-07T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61345
published_at 2026-04-02T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61431
published_at 2026-04-16T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61393
published_at 2026-04-13T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61412
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22753
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053241
reference_id 2053241
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053241
3
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
5
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
reference_id mfsa2022-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
7
reference_url https://www.mozilla.org/security/advisories/mfsa2022-05/
reference_id mfsa2022-05
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/
url https://www.mozilla.org/security/advisories/mfsa2022-05/
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
reference_id mfsa2022-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
9
reference_url https://www.mozilla.org/security/advisories/mfsa2022-06/
reference_id mfsa2022-06
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/
url https://www.mozilla.org/security/advisories/mfsa2022-06/
10
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1732435
reference_id show_bug.cgi?id=1732435
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:47:11Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1732435
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22753
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqte-f1hw-2ya5
16
url VCID-mzbp-5r6m-27cm
vulnerability_id VCID-mzbp-5r6m-27cm
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22740.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22740
reference_id
reference_type
scores
0
value 0.00269
scoring_system epss
scoring_elements 0.50447
published_at 2026-04-16T12:55:00Z
1
value 0.00269
scoring_system epss
scoring_elements 0.50417
published_at 2026-04-12T12:55:00Z
2
value 0.00269
scoring_system epss
scoring_elements 0.50374
published_at 2026-04-02T12:55:00Z
3
value 0.00269
scoring_system epss
scoring_elements 0.5044
published_at 2026-04-11T12:55:00Z
4
value 0.00269
scoring_system epss
scoring_elements 0.50399
published_at 2026-04-09T12:55:00Z
5
value 0.00269
scoring_system epss
scoring_elements 0.50406
published_at 2026-04-08T12:55:00Z
6
value 0.00269
scoring_system epss
scoring_elements 0.50403
published_at 2026-04-13T12:55:00Z
7
value 0.00269
scoring_system epss
scoring_elements 0.50353
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039565
reference_id 2039565
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039565
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1742334
reference_id show_bug.cgi?id=1742334
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:31:42Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1742334
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22740
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mzbp-5r6m-27cm
17
url VCID-n796-xf5e-pucq
vulnerability_id VCID-n796-xf5e-pucq
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4140.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4140.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4140
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18397
published_at 2026-04-04T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18188
published_at 2026-04-01T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18344
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19942
published_at 2026-04-08T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19862
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.19971
published_at 2026-04-12T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20016
published_at 2026-04-11T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19996
published_at 2026-04-09T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19913
published_at 2026-04-13T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19891
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4140
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039568
reference_id 2039568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039568
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1746720
reference_id show_bug.cgi?id=1746720
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:55:14Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1746720
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2021-4140
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n796-xf5e-pucq
18
url VCID-q4bf-vh36-kye9
vulnerability_id VCID-q4bf-vh36-kye9
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22756.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22756.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22756
reference_id
reference_type
scores
0
value 0.00269
scoring_system epss
scoring_elements 0.50354
published_at 2026-04-04T12:55:00Z
1
value 0.00269
scoring_system epss
scoring_elements 0.5039
published_at 2026-04-11T12:55:00Z
2
value 0.00269
scoring_system epss
scoring_elements 0.50348
published_at 2026-04-09T12:55:00Z
3
value 0.00269
scoring_system epss
scoring_elements 0.50355
published_at 2026-04-08T12:55:00Z
4
value 0.00269
scoring_system epss
scoring_elements 0.50302
published_at 2026-04-07T12:55:00Z
5
value 0.00269
scoring_system epss
scoring_elements 0.50325
published_at 2026-04-02T12:55:00Z
6
value 0.00269
scoring_system epss
scoring_elements 0.50397
published_at 2026-04-16T12:55:00Z
7
value 0.00269
scoring_system epss
scoring_elements 0.50352
published_at 2026-04-13T12:55:00Z
8
value 0.00269
scoring_system epss
scoring_elements 0.50366
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22756
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053237
reference_id 2053237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053237
10
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
11
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
reference_id mfsa2022-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-05/
reference_id mfsa2022-05
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2022-05/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
reference_id mfsa2022-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-06/
reference_id mfsa2022-06
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:37:12Z/
url https://www.mozilla.org/security/advisories/mfsa2022-06/
18
reference_url https://access.redhat.com/errata/RHSA-2022:0510
reference_id RHSA-2022:0510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0510
19
reference_url https://access.redhat.com/errata/RHSA-2022:0511
reference_id RHSA-2022:0511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0511
20
reference_url https://access.redhat.com/errata/RHSA-2022:0512
reference_id RHSA-2022:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0512
21
reference_url https://access.redhat.com/errata/RHSA-2022:0513
reference_id RHSA-2022:0513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0513
22
reference_url https://access.redhat.com/errata/RHSA-2022:0514
reference_id RHSA-2022:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0514
23
reference_url https://access.redhat.com/errata/RHSA-2022:0535
reference_id RHSA-2022:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0535
24
reference_url https://access.redhat.com/errata/RHSA-2022:0536
reference_id RHSA-2022:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0536
25
reference_url https://access.redhat.com/errata/RHSA-2022:0537
reference_id RHSA-2022:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0537
26
reference_url https://access.redhat.com/errata/RHSA-2022:0538
reference_id RHSA-2022:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0538
27
reference_url https://access.redhat.com/errata/RHSA-2022:0539
reference_id RHSA-2022:0539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0539
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1317873
reference_id show_bug.cgi?id=1317873
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:37:12Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1317873
29
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
30
reference_url https://usn.ubuntu.com/5345-1/
reference_id USN-5345-1
reference_type
scores
url https://usn.ubuntu.com/5345-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22756
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4bf-vh36-kye9
19
url VCID-qgvp-4eea-bkgm
vulnerability_id VCID-qgvp-4eea-bkgm
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22748.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22748.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22748
reference_id
reference_type
scores
0
value 0.00445
scoring_system epss
scoring_elements 0.63465
published_at 2026-04-16T12:55:00Z
1
value 0.00445
scoring_system epss
scoring_elements 0.63432
published_at 2026-04-13T12:55:00Z
2
value 0.00445
scoring_system epss
scoring_elements 0.63404
published_at 2026-04-02T12:55:00Z
3
value 0.00445
scoring_system epss
scoring_elements 0.63467
published_at 2026-04-12T12:55:00Z
4
value 0.00445
scoring_system epss
scoring_elements 0.63483
published_at 2026-04-11T12:55:00Z
5
value 0.00445
scoring_system epss
scoring_elements 0.63466
published_at 2026-04-09T12:55:00Z
6
value 0.00445
scoring_system epss
scoring_elements 0.63448
published_at 2026-04-08T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63431
published_at 2026-04-04T12:55:00Z
8
value 0.00445
scoring_system epss
scoring_elements 0.63397
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22748
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039569
reference_id 2039569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039569
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1705211
reference_id show_bug.cgi?id=1705211
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:55:10Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1705211
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22748
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qgvp-4eea-bkgm
20
url VCID-rsy6-acfe-ffb5
vulnerability_id VCID-rsy6-acfe-ffb5
summary The constructed curl command from the "Copy as curl" feature in DevTools was not properly escaped for PowerShell. This could have lead to command injection if pasted into a Powershell prompt.*This bug only affects Firefox for Windows. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22744.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22744
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63363
published_at 2026-04-16T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63329
published_at 2026-04-13T12:55:00Z
2
value 0.00443
scoring_system epss
scoring_elements 0.63302
published_at 2026-04-02T12:55:00Z
3
value 0.00443
scoring_system epss
scoring_elements 0.63382
published_at 2026-04-11T12:55:00Z
4
value 0.00443
scoring_system epss
scoring_elements 0.63365
published_at 2026-04-12T12:55:00Z
5
value 0.00443
scoring_system epss
scoring_elements 0.63347
published_at 2026-04-08T12:55:00Z
6
value 0.00443
scoring_system epss
scoring_elements 0.6333
published_at 2026-04-04T12:55:00Z
7
value 0.00443
scoring_system epss
scoring_elements 0.63296
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22744
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039571
reference_id 2039571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039571
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
4
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
6
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1737252
reference_id show_bug.cgi?id=1737252
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:10:40Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1737252
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22744
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rsy6-acfe-ffb5
21
url VCID-sx7g-4pjb-r7ac
vulnerability_id VCID-sx7g-4pjb-r7ac
summary If Firefox was installed to a world-writable directory, a local privilege escalation could occur when Firefox searched the current directory for system libraries. However the install directory is not world-writable by default.*This bug only affects Firefox for Windows in a non-default installation. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22736
reference_id
reference_type
scores
0
value 0.00109
scoring_system epss
scoring_elements 0.29279
published_at 2026-04-16T12:55:00Z
1
value 0.00109
scoring_system epss
scoring_elements 0.29383
published_at 2026-04-02T12:55:00Z
2
value 0.00109
scoring_system epss
scoring_elements 0.29309
published_at 2026-04-08T12:55:00Z
3
value 0.00109
scoring_system epss
scoring_elements 0.29349
published_at 2026-04-09T12:55:00Z
4
value 0.00109
scoring_system epss
scoring_elements 0.29353
published_at 2026-04-11T12:55:00Z
5
value 0.00109
scoring_system epss
scoring_elements 0.29306
published_at 2026-04-12T12:55:00Z
6
value 0.00109
scoring_system epss
scoring_elements 0.29254
published_at 2026-04-13T12:55:00Z
7
value 0.00109
scoring_system epss
scoring_elements 0.29432
published_at 2026-04-04T12:55:00Z
8
value 0.00109
scoring_system epss
scoring_elements 0.29245
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22736
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
2
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:12:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1742692
reference_id show_bug.cgi?id=1742692
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:12:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1742692
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22736
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sx7g-4pjb-r7ac
22
url VCID-szte-x7pv-7ydn
vulnerability_id VCID-szte-x7pv-7ydn
summary By generally accepting and passing resource handles across processes, a compromised content process might have confused higher privileged processes to interact with handles that the unprivileged process should not have access to.*This bug only affects Firefox for Windows and MacOS. Other operating systems are unaffected.*
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22750
reference_id
reference_type
scores
0
value 0.00323
scoring_system epss
scoring_elements 0.55444
published_at 2026-04-16T12:55:00Z
1
value 0.00323
scoring_system epss
scoring_elements 0.55383
published_at 2026-04-02T12:55:00Z
2
value 0.00323
scoring_system epss
scoring_elements 0.55408
published_at 2026-04-13T12:55:00Z
3
value 0.00323
scoring_system epss
scoring_elements 0.55386
published_at 2026-04-07T12:55:00Z
4
value 0.00323
scoring_system epss
scoring_elements 0.55437
published_at 2026-04-09T12:55:00Z
5
value 0.00323
scoring_system epss
scoring_elements 0.55448
published_at 2026-04-11T12:55:00Z
6
value 0.00323
scoring_system epss
scoring_elements 0.55426
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22750
1
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
2
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:23Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1566608
reference_id show_bug.cgi?id=1566608
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:52:23Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1566608
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22750
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-szte-x7pv-7ydn
23
url VCID-tnxh-tgsm-tuex
vulnerability_id VCID-tnxh-tgsm-tuex
summary A race condition could have allowed bypassing the fullscreen notification which could have lead to a fullscreen window spoof being unnoticed.*This bug only affects Firefox for Windows. Other operating systems are unaffected.*
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22746.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22746
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.31009
published_at 2026-04-16T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.30979
published_at 2026-04-13T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31111
published_at 2026-04-02T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.31024
published_at 2026-04-12T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31068
published_at 2026-04-11T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31062
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31033
published_at 2026-04-08T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31158
published_at 2026-04-04T12:55:00Z
8
value 0.0012
scoring_system epss
scoring_elements 0.30976
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22746
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039560
reference_id 2039560
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039560
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
4
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
6
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
8
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
9
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735071
reference_id show_bug.cgi?id=1735071
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:59:19Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735071
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22746
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tnxh-tgsm-tuex
24
url VCID-vy64-w5qh-duhp
vulnerability_id VCID-vy64-w5qh-duhp
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22762
reference_id
reference_type
scores
0
value 0.00291
scoring_system epss
scoring_elements 0.52549
published_at 2026-04-16T12:55:00Z
1
value 0.00291
scoring_system epss
scoring_elements 0.52451
published_at 2026-04-02T12:55:00Z
2
value 0.00291
scoring_system epss
scoring_elements 0.52498
published_at 2026-04-08T12:55:00Z
3
value 0.00291
scoring_system epss
scoring_elements 0.52492
published_at 2026-04-09T12:55:00Z
4
value 0.00291
scoring_system epss
scoring_elements 0.52543
published_at 2026-04-11T12:55:00Z
5
value 0.00291
scoring_system epss
scoring_elements 0.52527
published_at 2026-04-12T12:55:00Z
6
value 0.00291
scoring_system epss
scoring_elements 0.5251
published_at 2026-04-13T12:55:00Z
7
value 0.00291
scoring_system epss
scoring_elements 0.52479
published_at 2026-04-04T12:55:00Z
8
value 0.00291
scoring_system epss
scoring_elements 0.52446
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22762
1
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:31:34Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1743931
reference_id show_bug.cgi?id=1743931
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:31:34Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1743931
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22762
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vy64-w5qh-duhp
25
url VCID-xa7t-851a-efey
vulnerability_id VCID-xa7t-851a-efey
summary Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22758
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35837
published_at 2026-04-16T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.3592
published_at 2026-04-02T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35832
published_at 2026-04-08T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35854
published_at 2026-04-09T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35861
published_at 2026-04-11T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35821
published_at 2026-04-12T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35798
published_at 2026-04-13T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35951
published_at 2026-04-04T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35781
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22758
1
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
3
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:26:36Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1728742
reference_id show_bug.cgi?id=1728742
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:26:36Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1728742
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22758
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa7t-851a-efey
26
url VCID-xp3b-fyfq-xbbq
vulnerability_id VCID-xp3b-fyfq-xbbq
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22741.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22741.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22741
reference_id
reference_type
scores
0
value 0.00463
scoring_system epss
scoring_elements 0.64336
published_at 2026-04-16T12:55:00Z
1
value 0.00463
scoring_system epss
scoring_elements 0.64302
published_at 2026-04-13T12:55:00Z
2
value 0.00463
scoring_system epss
scoring_elements 0.64281
published_at 2026-04-02T12:55:00Z
3
value 0.00463
scoring_system epss
scoring_elements 0.64331
published_at 2026-04-12T12:55:00Z
4
value 0.00463
scoring_system epss
scoring_elements 0.64342
published_at 2026-04-11T12:55:00Z
5
value 0.00463
scoring_system epss
scoring_elements 0.64329
published_at 2026-04-09T12:55:00Z
6
value 0.00463
scoring_system epss
scoring_elements 0.64315
published_at 2026-04-08T12:55:00Z
7
value 0.00463
scoring_system epss
scoring_elements 0.64309
published_at 2026-04-04T12:55:00Z
8
value 0.00463
scoring_system epss
scoring_elements 0.64266
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22741
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039564
reference_id 2039564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039564
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1740389
reference_id show_bug.cgi?id=1740389
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:29:58Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1740389
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22741
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xp3b-fyfq-xbbq
27
url VCID-y12a-2bn1-vkdz
vulnerability_id VCID-y12a-2bn1-vkdz
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22759.json
reference_id
reference_type
scores
0
value 9.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22759.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22759
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49909
published_at 2026-04-04T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49925
published_at 2026-04-11T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49907
published_at 2026-04-09T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49914
published_at 2026-04-08T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49859
published_at 2026-04-07T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.4988
published_at 2026-04-02T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49944
published_at 2026-04-16T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.49898
published_at 2026-04-13T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49897
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22759
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053242
reference_id 2053242
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053242
10
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
11
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
reference_id mfsa2022-04
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-04
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-04/
reference_id mfsa2022-04
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:36:47Z/
url https://www.mozilla.org/security/advisories/mfsa2022-04/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
reference_id mfsa2022-05
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-05
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-05/
reference_id mfsa2022-05
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:36:47Z/
url https://www.mozilla.org/security/advisories/mfsa2022-05/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
reference_id mfsa2022-06
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-06
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-06/
reference_id mfsa2022-06
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:36:47Z/
url https://www.mozilla.org/security/advisories/mfsa2022-06/
18
reference_url https://access.redhat.com/errata/RHSA-2022:0510
reference_id RHSA-2022:0510
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0510
19
reference_url https://access.redhat.com/errata/RHSA-2022:0511
reference_id RHSA-2022:0511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0511
20
reference_url https://access.redhat.com/errata/RHSA-2022:0512
reference_id RHSA-2022:0512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0512
21
reference_url https://access.redhat.com/errata/RHSA-2022:0513
reference_id RHSA-2022:0513
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0513
22
reference_url https://access.redhat.com/errata/RHSA-2022:0514
reference_id RHSA-2022:0514
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0514
23
reference_url https://access.redhat.com/errata/RHSA-2022:0535
reference_id RHSA-2022:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0535
24
reference_url https://access.redhat.com/errata/RHSA-2022:0536
reference_id RHSA-2022:0536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0536
25
reference_url https://access.redhat.com/errata/RHSA-2022:0537
reference_id RHSA-2022:0537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0537
26
reference_url https://access.redhat.com/errata/RHSA-2022:0538
reference_id RHSA-2022:0538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0538
27
reference_url https://access.redhat.com/errata/RHSA-2022:0539
reference_id RHSA-2022:0539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0539
28
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1739957
reference_id show_bug.cgi?id=1739957
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:36:47Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1739957
29
reference_url https://usn.ubuntu.com/5284-1/
reference_id USN-5284-1
reference_type
scores
url https://usn.ubuntu.com/5284-1/
30
reference_url https://usn.ubuntu.com/5345-1/
reference_id USN-5345-1
reference_type
scores
url https://usn.ubuntu.com/5345-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22759
risk_score 4.3
exploitability 0.5
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y12a-2bn1-vkdz
28
url VCID-y43f-tmvr-hqas
vulnerability_id VCID-y43f-tmvr-hqas
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22747.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32455
published_at 2026-04-16T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32419
published_at 2026-04-13T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32582
published_at 2026-04-04T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32546
published_at 2026-04-02T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.32446
published_at 2026-04-12T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32485
published_at 2026-04-11T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.3248
published_at 2026-04-09T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32406
published_at 2026-04-07T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.32454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22747
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
reference_id 2039572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039572
16
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
17
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
18
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
19
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
21
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
22
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
23
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
24
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
25
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
26
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
27
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
28
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
29
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
30
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
31
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
32
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
33
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
reference_id show_bug.cgi?id=1735028
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:04:07Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1735028
35
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
36
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
37
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
38
reference_url https://usn.ubuntu.com/5506-1/
reference_id USN-5506-1
reference_type
scores
url https://usn.ubuntu.com/5506-1/
39
reference_url https://usn.ubuntu.com/5872-1/
reference_id USN-5872-1
reference_type
scores
url https://usn.ubuntu.com/5872-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22747
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y43f-tmvr-hqas
29
url VCID-y7wn-9j43-jba3
vulnerability_id VCID-y7wn-9j43-jba3
summary Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22742.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22742.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22742
reference_id
reference_type
scores
0
value 0.00319
scoring_system epss
scoring_elements 0.54931
published_at 2026-04-16T12:55:00Z
1
value 0.00319
scoring_system epss
scoring_elements 0.54893
published_at 2026-04-13T12:55:00Z
2
value 0.00319
scoring_system epss
scoring_elements 0.54878
published_at 2026-04-02T12:55:00Z
3
value 0.00319
scoring_system epss
scoring_elements 0.54916
published_at 2026-04-12T12:55:00Z
4
value 0.00319
scoring_system epss
scoring_elements 0.54934
published_at 2026-04-11T12:55:00Z
5
value 0.00319
scoring_system epss
scoring_elements 0.54922
published_at 2026-04-09T12:55:00Z
6
value 0.00319
scoring_system epss
scoring_elements 0.54923
published_at 2026-04-08T12:55:00Z
7
value 0.00319
scoring_system epss
scoring_elements 0.54904
published_at 2026-04-04T12:55:00Z
8
value 0.00319
scoring_system epss
scoring_elements 0.54873
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22742
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2039563
reference_id 2039563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2039563
15
reference_url https://security.gentoo.org/glsa/202202-03
reference_id GLSA-202202-03
reference_type
scores
url https://security.gentoo.org/glsa/202202-03
16
reference_url https://security.gentoo.org/glsa/202208-14
reference_id GLSA-202208-14
reference_type
scores
url https://security.gentoo.org/glsa/202208-14
17
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
reference_id mfsa2022-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-01
18
reference_url https://www.mozilla.org/security/advisories/mfsa2022-01/
reference_id mfsa2022-01
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2022-01/
19
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
reference_id mfsa2022-02
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-02
20
reference_url https://www.mozilla.org/security/advisories/mfsa2022-02/
reference_id mfsa2022-02
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2022-02/
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
reference_id mfsa2022-03
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-03
22
reference_url https://www.mozilla.org/security/advisories/mfsa2022-03/
reference_id mfsa2022-03
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://www.mozilla.org/security/advisories/mfsa2022-03/
23
reference_url https://access.redhat.com/errata/RHSA-2022:0123
reference_id RHSA-2022:0123
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0123
24
reference_url https://access.redhat.com/errata/RHSA-2022:0124
reference_id RHSA-2022:0124
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0124
25
reference_url https://access.redhat.com/errata/RHSA-2022:0125
reference_id RHSA-2022:0125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0125
26
reference_url https://access.redhat.com/errata/RHSA-2022:0126
reference_id RHSA-2022:0126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0126
27
reference_url https://access.redhat.com/errata/RHSA-2022:0127
reference_id RHSA-2022:0127
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0127
28
reference_url https://access.redhat.com/errata/RHSA-2022:0128
reference_id RHSA-2022:0128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0128
29
reference_url https://access.redhat.com/errata/RHSA-2022:0129
reference_id RHSA-2022:0129
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0129
30
reference_url https://access.redhat.com/errata/RHSA-2022:0130
reference_id RHSA-2022:0130
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0130
31
reference_url https://access.redhat.com/errata/RHSA-2022:0131
reference_id RHSA-2022:0131
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0131
32
reference_url https://access.redhat.com/errata/RHSA-2022:0132
reference_id RHSA-2022:0132
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:0132
33
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1739923
reference_id show_bug.cgi?id=1739923
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:28:39Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1739923
34
reference_url https://usn.ubuntu.com/5229-1/
reference_id USN-5229-1
reference_type
scores
url https://usn.ubuntu.com/5229-1/
35
reference_url https://usn.ubuntu.com/5246-1/
reference_id USN-5246-1
reference_type
scores
url https://usn.ubuntu.com/5246-1/
36
reference_url https://usn.ubuntu.com/5248-1/
reference_id USN-5248-1
reference_type
scores
url https://usn.ubuntu.com/5248-1/
fixed_packages
0
url pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/firefox@97.0-r0?arch=armhf&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community
aliases CVE-2022-22742
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7wn-9j43-jba3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox@97.0-r0%3Farch=armhf&distroversion=v3.23&reponame=community