{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","type":"ebuild","namespace":"mail-client","name":"thunderbird-bin","version":"68.6.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"68.8.0","latest_non_vulnerable_version":"128.9.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31936?format=json","vulnerability_id":"VCID-16ta-j6p4-afgn","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6794.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6794.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6794","reference_id":"","reference_type":"","scores":[{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60538","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60642","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60613","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00399","scoring_system":"epss","scoring_elements":"0.60677","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801956","reference_id":"1801956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801956"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6794"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-16ta-j6p4-afgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31946?format=json","vulnerability_id":"VCID-1a64-m2w1-hkhs","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6814","reference_id":"","reference_type":"","scores":[{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74664","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74673","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74619","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74693","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7467","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74624","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.74623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00837","scoring_system":"epss","scoring_elements":"0.7465","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6814"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812205","reference_id":"1812205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812205"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6814","reference_id":"CVE-2020-6814","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6814"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6814"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1a64-m2w1-hkhs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31935?format=json","vulnerability_id":"VCID-23mb-npay-uqaq","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6793.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6793.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6793","reference_id":"","reference_type":"","scores":[{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.7405","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74098","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74053","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74086","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00803","scoring_system":"epss","scoring_elements":"0.74101","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801955","reference_id":"1801955","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801955"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6793"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-23mb-npay-uqaq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31932?format=json","vulnerability_id":"VCID-3smq-ax5u-ryd3","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17012.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012","reference_id":"","reference_type":"","scores":[{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84214","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02152","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17012"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437","reference_id":"1779437","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779437"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-17012"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3smq-ax5u-ryd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31937?format=json","vulnerability_id":"VCID-9c8c-d9u8-83bx","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6795.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6795.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6795","reference_id":"","reference_type":"","scores":[{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.7168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71752","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71686","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71704","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71678","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71717","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71728","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801957","reference_id":"1801957","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801957"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6795"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9c8c-d9u8-83bx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31927?format=json","vulnerability_id":"VCID-b67z-91x3-sug1","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11764.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11764.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11764","reference_id":"","reference_type":"","scores":[{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76658","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.7669","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.7673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.7671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76644","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76648","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00976","scoring_system":"epss","scoring_elements":"0.76677","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764446","reference_id":"1764446","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764446"},{"reference_url":"https://security.archlinux.org/ASA-201910-15","reference_id":"ASA-201910-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-15"},{"reference_url":"https://security.archlinux.org/ASA-201910-16","reference_id":"ASA-201910-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-16"},{"reference_url":"https://security.archlinux.org/AVG-1054","reference_id":"AVG-1054","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1054"},{"reference_url":"https://security.archlinux.org/AVG-1055","reference_id":"AVG-1055","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1055"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33","reference_id":"mfsa2019-33","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34","reference_id":"mfsa2019-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35","reference_id":"mfsa2019-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3193","reference_id":"RHSA-2019:3193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3196","reference_id":"RHSA-2019:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3210","reference_id":"RHSA-2019:3210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3237","reference_id":"RHSA-2019:3237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3281","reference_id":"RHSA-2019:3281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3756","reference_id":"RHSA-2019:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3756"},{"reference_url":"https://usn.ubuntu.com/4165-1/","reference_id":"USN-4165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4165-1/"},{"reference_url":"https://usn.ubuntu.com/4202-1/","reference_id":"USN-4202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4202-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11764"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b67z-91x3-sug1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31923?format=json","vulnerability_id":"VCID-bae9-9f51-wqac","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11760.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11760.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11760","reference_id":"","reference_type":"","scores":[{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81256","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81224","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81252","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01522","scoring_system":"epss","scoring_elements":"0.81201","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764441","reference_id":"1764441","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764441"},{"reference_url":"https://security.archlinux.org/ASA-201910-15","reference_id":"ASA-201910-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-15"},{"reference_url":"https://security.archlinux.org/ASA-201910-16","reference_id":"ASA-201910-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-16"},{"reference_url":"https://security.archlinux.org/AVG-1054","reference_id":"AVG-1054","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1054"},{"reference_url":"https://security.archlinux.org/AVG-1055","reference_id":"AVG-1055","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1055"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33","reference_id":"mfsa2019-33","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34","reference_id":"mfsa2019-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35","reference_id":"mfsa2019-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3193","reference_id":"RHSA-2019:3193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3196","reference_id":"RHSA-2019:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3210","reference_id":"RHSA-2019:3210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3237","reference_id":"RHSA-2019:3237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3281","reference_id":"RHSA-2019:3281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3756","reference_id":"RHSA-2019:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3756"},{"reference_url":"https://usn.ubuntu.com/4165-1/","reference_id":"USN-4165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4165-1/"},{"reference_url":"https://usn.ubuntu.com/4202-1/","reference_id":"USN-4202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4202-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11760"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bae9-9f51-wqac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31934?format=json","vulnerability_id":"VCID-cy4f-4pvz-23fh","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6792.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6792","reference_id":"","reference_type":"","scores":[{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76346","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76404","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76409","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.7635","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76359","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76392","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00953","scoring_system":"epss","scoring_elements":"0.76405","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801958","reference_id":"1801958","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801958"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6792"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cy4f-4pvz-23fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31928?format=json","vulnerability_id":"VCID-ex1b-2rdy-7qhw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17005.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005","reference_id":"","reference_type":"","scores":[{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.8626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86222","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86223","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86241","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86264","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86199","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02867","scoring_system":"epss","scoring_elements":"0.86209","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435","reference_id":"1779435","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779435"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-17005"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1b-2rdy-7qhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31921?format=json","vulnerability_id":"VCID-j64y-ejt3-tbe3","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11757.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11757.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11757","reference_id":"","reference_type":"","scores":[{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80314","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80372","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80357","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80298","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80306","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0139","scoring_system":"epss","scoring_elements":"0.80326","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764438","reference_id":"1764438","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764438"},{"reference_url":"https://security.archlinux.org/ASA-201910-15","reference_id":"ASA-201910-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-15"},{"reference_url":"https://security.archlinux.org/ASA-201910-16","reference_id":"ASA-201910-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-16"},{"reference_url":"https://security.archlinux.org/AVG-1054","reference_id":"AVG-1054","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1054"},{"reference_url":"https://security.archlinux.org/AVG-1055","reference_id":"AVG-1055","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1055"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33","reference_id":"mfsa2019-33","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34","reference_id":"mfsa2019-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35","reference_id":"mfsa2019-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3193","reference_id":"RHSA-2019:3193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3196","reference_id":"RHSA-2019:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3210","reference_id":"RHSA-2019:3210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3237","reference_id":"RHSA-2019:3237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3281","reference_id":"RHSA-2019:3281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3756","reference_id":"RHSA-2019:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3756"},{"reference_url":"https://usn.ubuntu.com/4165-1/","reference_id":"USN-4165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4165-1/"},{"reference_url":"https://usn.ubuntu.com/4202-1/","reference_id":"USN-4202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4202-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11757"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j64y-ejt3-tbe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31944?format=json","vulnerability_id":"VCID-jr81-ed7a-aqcp","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6811","reference_id":"","reference_type":"","scores":[{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82967","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82957","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.8295","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82925","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82916","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01843","scoring_system":"epss","scoring_elements":"0.82929","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6811"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607742","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1607742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812202","reference_id":"1812202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812202"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6811","reference_id":"CVE-2020-6811","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6811"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6811"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jr81-ed7a-aqcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31933?format=json","vulnerability_id":"VCID-m5h6-y3tw-eue6","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20503","reference_id":"","reference_type":"","scores":[{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85277","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.8528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85205","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85267","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85237","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85235","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02474","scoring_system":"epss","scoring_elements":"0.85216","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6422"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6426"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6449"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812203","reference_id":"1812203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812203"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270","reference_id":"953270","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953270"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-12","reference_id":"ASA-202003-12","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-12"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://security.archlinux.org/AVG-1118","reference_id":"AVG-1118","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1118"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1270","reference_id":"RHSA-2020:1270","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1270"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-20503"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5h6-y3tw-eue6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31926?format=json","vulnerability_id":"VCID-mnt3-q341-j7gj","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11763.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11763.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11763","reference_id":"","reference_type":"","scores":[{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.8453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.84493","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.84514","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.8452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.84539","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.84534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.84456","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.84472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0223","scoring_system":"epss","scoring_elements":"0.84491","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764444","reference_id":"1764444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764444"},{"reference_url":"https://security.archlinux.org/ASA-201910-15","reference_id":"ASA-201910-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-15"},{"reference_url":"https://security.archlinux.org/ASA-201910-16","reference_id":"ASA-201910-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-16"},{"reference_url":"https://security.archlinux.org/AVG-1054","reference_id":"AVG-1054","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1054"},{"reference_url":"https://security.archlinux.org/AVG-1055","reference_id":"AVG-1055","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1055"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33","reference_id":"mfsa2019-33","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34","reference_id":"mfsa2019-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35","reference_id":"mfsa2019-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3193","reference_id":"RHSA-2019:3193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3196","reference_id":"RHSA-2019:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3210","reference_id":"RHSA-2019:3210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3237","reference_id":"RHSA-2019:3237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3281","reference_id":"RHSA-2019:3281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3756","reference_id":"RHSA-2019:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3756"},{"reference_url":"https://usn.ubuntu.com/4165-1/","reference_id":"USN-4165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4165-1/"},{"reference_url":"https://usn.ubuntu.com/4202-1/","reference_id":"USN-4202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4202-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11763"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mnt3-q341-j7gj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31925?format=json","vulnerability_id":"VCID-nbvc-j1zu-v7d8","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11762.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11762","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59397","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59413","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59432","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59415","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59284","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59358","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59382","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764443","reference_id":"1764443","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764443"},{"reference_url":"https://security.archlinux.org/ASA-201910-15","reference_id":"ASA-201910-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-15"},{"reference_url":"https://security.archlinux.org/ASA-201910-16","reference_id":"ASA-201910-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-16"},{"reference_url":"https://security.archlinux.org/AVG-1054","reference_id":"AVG-1054","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1054"},{"reference_url":"https://security.archlinux.org/AVG-1055","reference_id":"AVG-1055","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1055"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33","reference_id":"mfsa2019-33","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34","reference_id":"mfsa2019-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35","reference_id":"mfsa2019-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3193","reference_id":"RHSA-2019:3193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3196","reference_id":"RHSA-2019:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3210","reference_id":"RHSA-2019:3210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3237","reference_id":"RHSA-2019:3237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3281","reference_id":"RHSA-2019:3281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3756","reference_id":"RHSA-2019:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3756"},{"reference_url":"https://usn.ubuntu.com/4165-1/","reference_id":"USN-4165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4165-1/"},{"reference_url":"https://usn.ubuntu.com/4202-1/","reference_id":"USN-4202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4202-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11762"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nbvc-j1zu-v7d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31929?format=json","vulnerability_id":"VCID-pws7-8qmm-hfes","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008","reference_id":"","reference_type":"","scores":[{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00854","scoring_system":"epss","scoring_elements":"0.74897","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431","reference_id":"1779431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779431"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-17008"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pws7-8qmm-hfes"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31938?format=json","vulnerability_id":"VCID-rszh-1c16-47ah","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6798.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6798","reference_id":"","reference_type":"","scores":[{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81972","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81939","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81935","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81962","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.8197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81989","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01646","scoring_system":"epss","scoring_elements":"0.81916","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801918","reference_id":"1801918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801918"},{"reference_url":"https://security.archlinux.org/ASA-202002-5","reference_id":"ASA-202002-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-5"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1096","reference_id":"AVG-1096","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1096"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05","reference_id":"mfsa2020-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06","reference_id":"mfsa2020-06","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0512","reference_id":"RHSA-2020:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0519","reference_id":"RHSA-2020:0519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0520","reference_id":"RHSA-2020:0520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0520"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0521","reference_id":"RHSA-2020:0521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4278-1/","reference_id":"USN-4278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-1/"},{"reference_url":"https://usn.ubuntu.com/4278-2/","reference_id":"USN-4278-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-2/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6798"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rszh-1c16-47ah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31940?format=json","vulnerability_id":"VCID-t4eb-c363-u7hc","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6805","reference_id":"","reference_type":"","scores":[{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74928","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74924","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74889","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00853","scoring_system":"epss","scoring_elements":"0.74917","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6805"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1610880","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1610880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812199","reference_id":"1812199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812199"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6805","reference_id":"CVE-2020-6805","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6805"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6805"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t4eb-c363-u7hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31922?format=json","vulnerability_id":"VCID-tvsp-tsfk-v7eg","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11759.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11759.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11759","reference_id":"","reference_type":"","scores":[{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85351","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85296","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85309","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0251","scoring_system":"epss","scoring_elements":"0.85327","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764440","reference_id":"1764440","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764440"},{"reference_url":"https://security.archlinux.org/ASA-201910-15","reference_id":"ASA-201910-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-15"},{"reference_url":"https://security.archlinux.org/ASA-201910-16","reference_id":"ASA-201910-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-16"},{"reference_url":"https://security.archlinux.org/AVG-1054","reference_id":"AVG-1054","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1054"},{"reference_url":"https://security.archlinux.org/AVG-1055","reference_id":"AVG-1055","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1055"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33","reference_id":"mfsa2019-33","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34","reference_id":"mfsa2019-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35","reference_id":"mfsa2019-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3193","reference_id":"RHSA-2019:3193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3196","reference_id":"RHSA-2019:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3210","reference_id":"RHSA-2019:3210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3237","reference_id":"RHSA-2019:3237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3281","reference_id":"RHSA-2019:3281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3756","reference_id":"RHSA-2019:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3756"},{"reference_url":"https://usn.ubuntu.com/4165-1/","reference_id":"USN-4165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4165-1/"},{"reference_url":"https://usn.ubuntu.com/4202-1/","reference_id":"USN-4202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4202-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11759"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tvsp-tsfk-v7eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31920?format=json","vulnerability_id":"VCID-vzb9-aeqz-hybr","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11745","reference_id":"","reference_type":"","scores":[{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74152","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74174","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74155","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00806","scoring_system":"epss","scoring_elements":"0.74107","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17007"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774831","reference_id":"1774831","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774831"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://security.gentoo.org/glsa/202003-37","reference_id":"GLSA-202003-37","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4114","reference_id":"RHSA-2019:4114","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4114"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4152","reference_id":"RHSA-2019:4152","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4152"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4190","reference_id":"RHSA-2019:4190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0243","reference_id":"RHSA-2020:0243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0466","reference_id":"RHSA-2020:0466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1267","reference_id":"RHSA-2020:1267","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1267"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1345","reference_id":"RHSA-2020:1345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1461","reference_id":"RHSA-2020:1461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1461"},{"reference_url":"https://usn.ubuntu.com/4203-1/","reference_id":"USN-4203-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4203-1/"},{"reference_url":"https://usn.ubuntu.com/4203-2/","reference_id":"USN-4203-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4203-2/"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11745"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzb9-aeqz-hybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31943?format=json","vulnerability_id":"VCID-wpm1-y59u-zkgu","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6807","reference_id":"","reference_type":"","scores":[{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73668","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73676","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73616","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73671","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73627","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00779","scoring_system":"epss","scoring_elements":"0.73651","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6807"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1614971","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1614971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812201","reference_id":"1812201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812201"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6807","reference_id":"CVE-2020-6807","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6807"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6807"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpm1-y59u-zkgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31924?format=json","vulnerability_id":"VCID-wpvp-c7aw-qfhw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11761.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11761.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11761","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6325","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63301","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63336","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6332","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63196","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63285","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764442","reference_id":"1764442","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764442"},{"reference_url":"https://security.archlinux.org/ASA-201910-15","reference_id":"ASA-201910-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-15"},{"reference_url":"https://security.archlinux.org/ASA-201910-16","reference_id":"ASA-201910-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201910-16"},{"reference_url":"https://security.archlinux.org/AVG-1054","reference_id":"AVG-1054","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1054"},{"reference_url":"https://security.archlinux.org/AVG-1055","reference_id":"AVG-1055","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1055"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33","reference_id":"mfsa2019-33","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-33"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34","reference_id":"mfsa2019-34","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35","reference_id":"mfsa2019-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-35"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3193","reference_id":"RHSA-2019:3193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3196","reference_id":"RHSA-2019:3196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3210","reference_id":"RHSA-2019:3210","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3210"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3237","reference_id":"RHSA-2019:3237","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3281","reference_id":"RHSA-2019:3281","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3281"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3756","reference_id":"RHSA-2019:3756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3756"},{"reference_url":"https://usn.ubuntu.com/4165-1/","reference_id":"USN-4165-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4165-1/"},{"reference_url":"https://usn.ubuntu.com/4202-1/","reference_id":"USN-4202-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4202-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-11761"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wpvp-c7aw-qfhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31941?format=json","vulnerability_id":"VCID-x4vq-y6b6-dqf6","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6806","reference_id":"","reference_type":"","scores":[{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87614","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87617","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87559","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87622","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.8761","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03504","scoring_system":"epss","scoring_elements":"0.87582","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6806"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1612308","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1612308"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812200","reference_id":"1812200","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812200"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6806","reference_id":"CVE-2020-6806","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6806"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6806"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4vq-y6b6-dqf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31939?format=json","vulnerability_id":"VCID-y8vr-48q8-a3aj","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6800.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6800","reference_id":"","reference_type":"","scores":[{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.7933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79333","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79341","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79281","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0125","scoring_system":"epss","scoring_elements":"0.79288","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6800"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6793"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6796"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6798"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6800"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801920","reference_id":"1801920","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1801920"},{"reference_url":"https://security.archlinux.org/ASA-202002-5","reference_id":"ASA-202002-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-5"},{"reference_url":"https://security.archlinux.org/ASA-202002-9","reference_id":"ASA-202002-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202002-9"},{"reference_url":"https://security.archlinux.org/AVG-1096","reference_id":"AVG-1096","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1096"},{"reference_url":"https://security.archlinux.org/AVG-1099","reference_id":"AVG-1099","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1099"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05","reference_id":"mfsa2020-05","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-05"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06","reference_id":"mfsa2020-06","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07","reference_id":"mfsa2020-07","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0512","reference_id":"RHSA-2020:0512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0519","reference_id":"RHSA-2020:0519","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0519"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0520","reference_id":"RHSA-2020:0520","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0520"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0521","reference_id":"RHSA-2020:0521","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0521"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0565","reference_id":"RHSA-2020:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0574","reference_id":"RHSA-2020:0574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0576","reference_id":"RHSA-2020:0576","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0576"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0577","reference_id":"RHSA-2020:0577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0577"},{"reference_url":"https://usn.ubuntu.com/4278-1/","reference_id":"USN-4278-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-1/"},{"reference_url":"https://usn.ubuntu.com/4278-2/","reference_id":"USN-4278-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4278-2/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6800"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8vr-48q8-a3aj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31945?format=json","vulnerability_id":"VCID-yr3c-1cqv-n3bw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6812","reference_id":"","reference_type":"","scores":[{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68908","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68937","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68842","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68929","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6886","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.68859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00581","scoring_system":"epss","scoring_elements":"0.6888","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6812"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1616661","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1616661"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-08/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-08/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-09/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-09/"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2020-10/","reference_id":"","reference_type":"","scores":[],"url":"https://www.mozilla.org/security/advisories/mfsa2020-10/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812204","reference_id":"1812204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1812204"},{"reference_url":"https://security.archlinux.org/ASA-202003-11","reference_id":"ASA-202003-11","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-11"},{"reference_url":"https://security.archlinux.org/ASA-202003-8","reference_id":"ASA-202003-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202003-8"},{"reference_url":"https://security.archlinux.org/AVG-1112","reference_id":"AVG-1112","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1112"},{"reference_url":"https://security.archlinux.org/AVG-1115","reference_id":"AVG-1115","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1115"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6812","reference_id":"CVE-2020-6812","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6812"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08","reference_id":"mfsa2020-08","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09","reference_id":"mfsa2020-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-09"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10","reference_id":"mfsa2020-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2020-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0815","reference_id":"RHSA-2020:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0816","reference_id":"RHSA-2020:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0819","reference_id":"RHSA-2020:0819","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0819"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0820","reference_id":"RHSA-2020:0820","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0820"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0905","reference_id":"RHSA-2020:0905","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0905"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0914","reference_id":"RHSA-2020:0914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0918","reference_id":"RHSA-2020:0918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0919","reference_id":"RHSA-2020:0919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0919"},{"reference_url":"https://usn.ubuntu.com/4299-1/","reference_id":"USN-4299-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4299-1/"},{"reference_url":"https://usn.ubuntu.com/4328-1/","reference_id":"USN-4328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4328-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2020-6812"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yr3c-1cqv-n3bw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31931?format=json","vulnerability_id":"VCID-zh2m-qyw5-dkgn","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436","reference_id":"1779436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779436"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-17011"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zh2m-qyw5-dkgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31930?format=json","vulnerability_id":"VCID-zstj-sux9-ubdd","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird,\n    the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010","reference_id":"","reference_type":"","scores":[{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79943","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79891","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01329","scoring_system":"epss","scoring_elements":"0.79898","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434","reference_id":"1779434","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1779434"},{"reference_url":"https://security.archlinux.org/ASA-201912-1","reference_id":"ASA-201912-1","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-1"},{"reference_url":"https://security.archlinux.org/ASA-201912-2","reference_id":"ASA-201912-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201912-2"},{"reference_url":"https://security.archlinux.org/AVG-1071","reference_id":"AVG-1071","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1071"},{"reference_url":"https://security.archlinux.org/AVG-1072","reference_id":"AVG-1072","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1072"},{"reference_url":"https://security.gentoo.org/glsa/202003-02","reference_id":"GLSA-202003-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-02"},{"reference_url":"https://security.gentoo.org/glsa/202003-10","reference_id":"GLSA-202003-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202003-10"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36","reference_id":"mfsa2019-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37","reference_id":"mfsa2019-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38","reference_id":"mfsa2019-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2019-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4107","reference_id":"RHSA-2019:4107","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4107"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4108","reference_id":"RHSA-2019:4108","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4111","reference_id":"RHSA-2019:4111","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4111"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4148","reference_id":"RHSA-2019:4148","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4148"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4195","reference_id":"RHSA-2019:4195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:4205","reference_id":"RHSA-2019:4205","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:4205"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0292","reference_id":"RHSA-2020:0292","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0292"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0295","reference_id":"RHSA-2020:0295","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0295"},{"reference_url":"https://usn.ubuntu.com/4216-1/","reference_id":"USN-4216-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-1/"},{"reference_url":"https://usn.ubuntu.com/4216-2/","reference_id":"USN-4216-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4216-2/"},{"reference_url":"https://usn.ubuntu.com/4241-1/","reference_id":"USN-4241-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4241-1/"},{"reference_url":"https://usn.ubuntu.com/4335-1/","reference_id":"USN-4335-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4335-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/72001?format=json","purl":"pkg:ebuild/mail-client/thunderbird-bin@68.6.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}],"aliases":["CVE-2019-17010"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zstj-sux9-ubdd"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird-bin@68.6.0"}