Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
Typeapk
Namespacealpine
Namefirefox-esr
Version102.6.0-r0
Qualifiers
arch armv7
distroversion v3.18
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version102.7.0-r0
Latest_non_vulnerable_version115.17.0-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-362f-1bn1-mbg5
vulnerability_id VCID-362f-1bn1-mbg5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46882.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46882
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54298
published_at 2026-04-07T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54395
published_at 2026-04-16T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54355
published_at 2026-04-13T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-12T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54394
published_at 2026-04-11T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54345
published_at 2026-04-09T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54323
published_at 2026-04-04T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.5435
published_at 2026-04-08T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54293
published_at 2026-04-02T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54379
published_at 2026-04-21T12:55:00Z
10
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-18T12:55:00Z
11
value 0.00332
scoring_system epss
scoring_elements 0.56041
published_at 2026-04-24T12:55:00Z
12
value 0.00332
scoring_system epss
scoring_elements 0.56037
published_at 2026-04-29T12:55:00Z
13
value 0.00332
scoring_system epss
scoring_elements 0.56062
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153467
reference_id 2153467
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153467
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-47
reference_id mfsa2022-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-47
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-47/
reference_id mfsa2022-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-47/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-52/
reference_id mfsa2022-52
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-52/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-53/
reference_id mfsa2022-53
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-53/
18
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
19
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
20
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
21
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
22
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
23
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
24
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
25
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
26
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
27
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
28
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
29
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
30
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
31
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
32
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
33
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1789371
reference_id show_bug.cgi?id=1789371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1789371
35
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2022-46882
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-362f-1bn1-mbg5
1
url VCID-e4nx-qfam-cfaj
vulnerability_id VCID-e4nx-qfam-cfaj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54744
published_at 2026-04-18T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54704
published_at 2026-04-13T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54689
published_at 2026-04-02T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54711
published_at 2026-04-04T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54681
published_at 2026-04-07T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54733
published_at 2026-04-08T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54729
published_at 2026-04-09T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54725
published_at 2026-04-21T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54742
published_at 2026-04-16T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56493
published_at 2026-04-29T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56494
published_at 2026-04-24T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.56513
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
reference_id 2153441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2022-46872
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e4nx-qfam-cfaj
2
url VCID-fxnj-rr7h-ryb5
vulnerability_id VCID-fxnj-rr7h-ryb5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46880.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46880
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-18T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39402
published_at 2026-04-02T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39426
published_at 2026-04-04T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.3934
published_at 2026-04-07T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39396
published_at 2026-04-08T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39413
published_at 2026-04-09T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39423
published_at 2026-04-11T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39384
published_at 2026-04-12T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39418
published_at 2026-04-16T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-13T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40529
published_at 2026-04-29T12:55:00Z
12
value 0.00189
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-24T12:55:00Z
13
value 0.00189
scoring_system epss
scoring_elements 0.40612
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46880
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153463
reference_id 2153463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153463
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-40
reference_id mfsa2022-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-40
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2022-46880
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxnj-rr7h-ryb5
3
url VCID-hp32-swmr-qqdy
vulnerability_id VCID-hp32-swmr-qqdy
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.5765
published_at 2026-04-21T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57671
published_at 2026-04-18T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57617
published_at 2026-04-02T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57638
published_at 2026-04-04T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57614
published_at 2026-04-07T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57668
published_at 2026-04-08T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57673
published_at 2026-04-09T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57687
published_at 2026-04-11T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57666
published_at 2026-04-12T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57676
published_at 2026-04-16T12:55:00Z
10
value 0.00352
scoring_system epss
scoring_elements 0.57646
published_at 2026-04-13T12:55:00Z
11
value 0.00375
scoring_system epss
scoring_elements 0.59148
published_at 2026-04-29T12:55:00Z
12
value 0.00375
scoring_system epss
scoring_elements 0.59144
published_at 2026-04-24T12:55:00Z
13
value 0.00375
scoring_system epss
scoring_elements 0.59163
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
reference_id 2153454
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2022-46878
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp32-swmr-qqdy
4
url VCID-q494-zvyn-quge
vulnerability_id VCID-q494-zvyn-quge
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46881.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46881
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47322
published_at 2026-04-21T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.47372
published_at 2026-04-18T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47296
published_at 2026-04-02T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47316
published_at 2026-04-04T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47263
published_at 2026-04-07T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47318
published_at 2026-04-08T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47315
published_at 2026-04-09T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47339
published_at 2026-04-11T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.47313
published_at 2026-04-12T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-16T12:55:00Z
10
value 0.0024
scoring_system epss
scoring_elements 0.4732
published_at 2026-04-13T12:55:00Z
11
value 0.00256
scoring_system epss
scoring_elements 0.48946
published_at 2026-04-29T12:55:00Z
12
value 0.00256
scoring_system epss
scoring_elements 0.48983
published_at 2026-04-24T12:55:00Z
13
value 0.00256
scoring_system epss
scoring_elements 0.48992
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46881
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153466
reference_id 2153466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153466
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-44
reference_id mfsa2022-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-44
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2022-46881
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q494-zvyn-quge
5
url VCID-v9ua-1tey-cyaa
vulnerability_id VCID-v9ua-1tey-cyaa
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46875.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46875
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34412
published_at 2026-04-07T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34457
published_at 2026-04-16T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34422
published_at 2026-04-13T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34446
published_at 2026-04-12T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34485
published_at 2026-04-11T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.34483
published_at 2026-04-09T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34545
published_at 2026-04-04T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34454
published_at 2026-04-08T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34517
published_at 2026-04-02T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34404
published_at 2026-04-21T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34442
published_at 2026-04-18T12:55:00Z
11
value 0.00151
scoring_system epss
scoring_elements 0.35495
published_at 2026-04-24T12:55:00Z
12
value 0.00151
scoring_system epss
scoring_elements 0.35378
published_at 2026-04-29T12:55:00Z
13
value 0.00151
scoring_system epss
scoring_elements 0.35464
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46875
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153451
reference_id 2153451
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153451
3
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://security.gentoo.org/glsa/202305-06
4
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://security.gentoo.org/glsa/202305-13
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
6
reference_url https://www.mozilla.org/security/advisories/mfsa2022-51/
reference_id mfsa2022-51
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2022-51/
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
8
reference_url https://www.mozilla.org/security/advisories/mfsa2022-52/
reference_id mfsa2022-52
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2022-52/
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
10
reference_url https://www.mozilla.org/security/advisories/mfsa2022-53/
reference_id mfsa2022-53
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://www.mozilla.org/security/advisories/mfsa2022-53/
11
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
reference_id show_bug.cgi?id=1786188
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:56:00Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1786188
fixed_packages
0
url pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2022-46875
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9ua-1tey-cyaa
6
url VCID-yxy6-s185-myc9
vulnerability_id VCID-yxy6-s185-myc9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59387
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59405
published_at 2026-04-18T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.5933
published_at 2026-04-02T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59353
published_at 2026-04-04T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59318
published_at 2026-04-07T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59368
published_at 2026-04-08T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-09T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59401
published_at 2026-04-11T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-12T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-16T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59366
published_at 2026-04-13T12:55:00Z
11
value 0.00403
scoring_system epss
scoring_elements 0.60885
published_at 2026-04-29T12:55:00Z
12
value 0.00403
scoring_system epss
scoring_elements 0.6088
published_at 2026-04-24T12:55:00Z
13
value 0.00403
scoring_system epss
scoring_elements 0.60892
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
reference_id 2153449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
reference_id mfsa2022-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
0
url pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/firefox-esr@102.6.0-r0?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2022-46874
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxy6-s185-myc9
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/firefox-esr@102.6.0-r0%3Farch=armv7&distroversion=v3.18&reponame=community