{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","type":"ebuild","namespace":"www-client","name":"firefox","version":"91.12.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"91.13.0","latest_non_vulnerable_version":"137.0.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46620?format=json","vulnerability_id":"VCID-13kw-adwc-93by","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29918","reference_id":"","reference_type":"","scores":[{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61053","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.6095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60948","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61007","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.6097","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60996","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60965","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60971","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60958","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29918"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1744043%2C1747178%2C1753535%2C1754017%2C1755847%2C1756172%2C1757477%2C1758223%2C1760160%2C1761481%2C1761771","reference_id":"buglist.cgi?bug_id=1744043%2C1747178%2C1753535%2C1754017%2C1755847%2C1756172%2C1757477%2C1758223%2C1760160%2C1761481%2C1761771","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:30Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1744043%2C1747178%2C1753535%2C1754017%2C1755847%2C1756172%2C1757477%2C1758223%2C1760160%2C1761481%2C1761771"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:30Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29918"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13kw-adwc-93by"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31201?format=json","vulnerability_id":"VCID-17tt-jftn-m3bd","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31737.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31737.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31737","reference_id":"","reference_type":"","scores":[{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60286","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60193","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60251","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00393","scoring_system":"epss","scoring_elements":"0.60187","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60408","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60348","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61852","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61833","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61851","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61844","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61788","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61836","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00418","scoring_system":"epss","scoring_elements":"0.61898","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092019","reference_id":"2092019","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092019"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.archlinux.org/AVG-2761","reference_id":"AVG-2761","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2761"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-21/","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-22/","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4870","reference_id":"RHSA-2022:4870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4871","reference_id":"RHSA-2022:4871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4872","reference_id":"RHSA-2022:4872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4873","reference_id":"RHSA-2022:4873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4875","reference_id":"RHSA-2022:4875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4876","reference_id":"RHSA-2022:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4887","reference_id":"RHSA-2022:4887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4888","reference_id":"RHSA-2022:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4889","reference_id":"RHSA-2022:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4890","reference_id":"RHSA-2022:4890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4891","reference_id":"RHSA-2022:4891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4892","reference_id":"RHSA-2022:4892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1743767","reference_id":"show_bug.cgi?id=1743767","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:56:21Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1743767"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31737"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-17tt-jftn-m3bd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31183?format=json","vulnerability_id":"VCID-1erb-xc8r-8kfm","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26384.json","reference_id":"","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26384","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30965","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30997","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31015","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3103","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31117","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31074","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31067","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.31164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.30982","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30593","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.30527","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31731","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31724","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.3165","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31797","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32006","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.31638","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062221","reference_id":"2062221","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062221"},{"reference_url":"https://security.archlinux.org/AVG-2713","reference_id":"AVG-2713","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2713"},{"reference_url":"https://security.archlinux.org/AVG-2714","reference_id":"AVG-2714","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2714"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-10/","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-10/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-11/","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-11/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-12/","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-12/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1744352","reference_id":"show_bug.cgi?id=1744352","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:16:17Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1744352"},{"reference_url":"https://usn.ubuntu.com/5321-1/","reference_id":"USN-5321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-1/"},{"reference_url":"https://usn.ubuntu.com/5321-2/","reference_id":"USN-5321-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-2/"},{"reference_url":"https://usn.ubuntu.com/5345-1/","reference_id":"USN-5345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5345-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26384"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1erb-xc8r-8kfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46638?format=json","vulnerability_id":"VCID-1uqv-yk9v-nkau","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36316","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49562","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49587","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49584","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4951","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49427","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49516","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49465","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49492","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.495","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49555","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49567","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49539","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4989","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50754","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36316"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-28/","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:05:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-28/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1768583","reference_id":"show_bug.cgi?id=1768583","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:05:41Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1768583"},{"reference_url":"https://usn.ubuntu.com/5536-1/","reference_id":"USN-5536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5536-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-36316"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1uqv-yk9v-nkau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31153?format=json","vulnerability_id":"VCID-27hw-egkx-w7d4","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1529.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1529","reference_id":"","reference_type":"","scores":[{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88813","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88962","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88902","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.8891","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88927","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88939","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88933","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88942","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88838","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88863","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.8887","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88883","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88881","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88878","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089218","reference_id":"2089218","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089218"},{"reference_url":"https://security.archlinux.org/AVG-2728","reference_id":"AVG-2728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2728"},{"reference_url":"https://security.archlinux.org/AVG-2729","reference_id":"AVG-2729","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2729"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-19","reference_id":"mfsa2022-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-19/","reference_id":"mfsa2022-19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:19:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-19/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4729","reference_id":"RHSA-2022:4729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4730","reference_id":"RHSA-2022:4730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4765","reference_id":"RHSA-2022:4765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4766","reference_id":"RHSA-2022:4766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4767","reference_id":"RHSA-2022:4767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4768","reference_id":"RHSA-2022:4768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4769","reference_id":"RHSA-2022:4769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4770","reference_id":"RHSA-2022:4770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4772","reference_id":"RHSA-2022:4772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4773","reference_id":"RHSA-2022:4773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4774","reference_id":"RHSA-2022:4774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4776","reference_id":"RHSA-2022:4776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4776"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770048","reference_id":"show_bug.cgi?id=1770048","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:19:19Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770048"},{"reference_url":"https://usn.ubuntu.com/5434-1/","reference_id":"USN-5434-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5434-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-1529"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-27hw-egkx-w7d4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31204?format=json","vulnerability_id":"VCID-2s85-r5tn-wucn","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31741.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31741","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54111","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54072","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54089","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5406","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54008","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54115","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0031","scoring_system":"epss","scoring_elements":"0.54239","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0031","scoring_system":"epss","scoring_elements":"0.54169","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55858","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55855","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55796","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55843","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55903","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092024","reference_id":"2092024","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092024"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.archlinux.org/AVG-2761","reference_id":"AVG-2761","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2761"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-21/","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-22/","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4870","reference_id":"RHSA-2022:4870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4871","reference_id":"RHSA-2022:4871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4872","reference_id":"RHSA-2022:4872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4873","reference_id":"RHSA-2022:4873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4875","reference_id":"RHSA-2022:4875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4876","reference_id":"RHSA-2022:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4887","reference_id":"RHSA-2022:4887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4888","reference_id":"RHSA-2022:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4889","reference_id":"RHSA-2022:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4890","reference_id":"RHSA-2022:4890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4891","reference_id":"RHSA-2022:4891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4892","reference_id":"RHSA-2022:4892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1767590","reference_id":"show_bug.cgi?id=1767590","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:58:38Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1767590"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31741"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2s85-r5tn-wucn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46630?format=json","vulnerability_id":"VCID-3u86-qe3j-63d3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34475","reference_id":"","reference_type":"","scores":[{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67422","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67285","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67326","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67364","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67337","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67361","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67303","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67302","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.6728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67301","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67313","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34475"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:29:25Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1757210","reference_id":"show_bug.cgi?id=1757210","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:29:25Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1757210"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34475"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3u86-qe3j-63d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46605?format=json","vulnerability_id":"VCID-5461-sgjx-3yd3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26385","reference_id":"","reference_type":"","scores":[{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57695","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57589","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57608","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57587","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57544","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57601","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57628","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57599","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.5762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57648","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57652","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57656","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57631","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26385"},{"reference_url":"https://security.archlinux.org/AVG-2714","reference_id":"AVG-2714","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2714"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-10/","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:13:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-10/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1747526","reference_id":"show_bug.cgi?id=1747526","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:13:05Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1747526"},{"reference_url":"https://usn.ubuntu.com/5321-1/","reference_id":"USN-5321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-1/"},{"reference_url":"https://usn.ubuntu.com/5321-2/","reference_id":"USN-5321-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26385"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5461-sgjx-3yd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31188?format=json","vulnerability_id":"VCID-59up-n66e-fyhx","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28281.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28281","reference_id":"","reference_type":"","scores":[{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94307","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94293","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94292","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94291","published_at":"2026-04-11T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94288","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13838","scoring_system":"epss","scoring_elements":"0.94274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13869","scoring_system":"epss","scoring_elements":"0.94374","published_at":"2026-05-14T12:55:00Z"},{"value":"0.13869","scoring_system":"epss","scoring_elements":"0.9436","published_at":"2026-05-12T12:55:00Z"},{"value":"0.14574","scoring_system":"epss","scoring_elements":"0.94488","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14574","scoring_system":"epss","scoring_elements":"0.94512","published_at":"2026-05-09T12:55:00Z"},{"value":"0.14574","scoring_system":"epss","scoring_elements":"0.94501","published_at":"2026-05-07T12:55:00Z"},{"value":"0.14574","scoring_system":"epss","scoring_elements":"0.94494","published_at":"2026-05-05T12:55:00Z"},{"value":"0.14574","scoring_system":"epss","scoring_elements":"0.9449","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14574","scoring_system":"epss","scoring_elements":"0.94516","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072560","reference_id":"2072560","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072560"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.archlinux.org/AVG-2712","reference_id":"AVG-2712","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2712"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-14/","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-14/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-15/","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-15/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1283","reference_id":"RHSA-2022:1283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1284","reference_id":"RHSA-2022:1284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1285","reference_id":"RHSA-2022:1285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1286","reference_id":"RHSA-2022:1286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1287","reference_id":"RHSA-2022:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1301","reference_id":"RHSA-2022:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1302","reference_id":"RHSA-2022:1302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1303","reference_id":"RHSA-2022:1303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1305","reference_id":"RHSA-2022:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1326","reference_id":"RHSA-2022:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1326"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1755621","reference_id":"show_bug.cgi?id=1755621","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:09:48Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1755621"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"},{"reference_url":"https://usn.ubuntu.com/5393-1/","reference_id":"USN-5393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28281"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-59up-n66e-fyhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31202?format=json","vulnerability_id":"VCID-5f8u-kf14-tkah","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31738.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31738.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31738","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35882","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3636","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36393","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36227","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36276","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36304","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36268","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36271","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.35815","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37172","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37092","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37315","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37294","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37204","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37087","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00165","scoring_system":"epss","scoring_elements":"0.37155","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092021","reference_id":"2092021","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092021"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.archlinux.org/AVG-2761","reference_id":"AVG-2761","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2761"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-21/","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-22/","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4870","reference_id":"RHSA-2022:4870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4871","reference_id":"RHSA-2022:4871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4872","reference_id":"RHSA-2022:4872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4873","reference_id":"RHSA-2022:4873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4875","reference_id":"RHSA-2022:4875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4876","reference_id":"RHSA-2022:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4887","reference_id":"RHSA-2022:4887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4888","reference_id":"RHSA-2022:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4889","reference_id":"RHSA-2022:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4890","reference_id":"RHSA-2022:4890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4891","reference_id":"RHSA-2022:4891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4892","reference_id":"RHSA-2022:4892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1756388","reference_id":"show_bug.cgi?id=1756388","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:54:02Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1756388"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31738"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5f8u-kf14-tkah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46601?format=json","vulnerability_id":"VCID-5up1-n726-hbg2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0843","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58926","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58706","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58769","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58813","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58872","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58827","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58854","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5877","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5882","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-0843"},{"reference_url":"https://security.archlinux.org/AVG-2714","reference_id":"AVG-2714","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2714"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746523%2C1749062%2C1749164%2C1749214%2C1749610%2C1750032%2C1752100%2C1752405%2C1753612%2C1754508","reference_id":"buglist.cgi?bug_id=1746523%2C1749062%2C1749164%2C1749214%2C1749610%2C1750032%2C1752100%2C1752405%2C1753612%2C1754508","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:31:24Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746523%2C1749062%2C1749164%2C1749214%2C1749610%2C1750032%2C1752100%2C1752405%2C1753612%2C1754508"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-10/","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T15:31:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-10/"},{"reference_url":"https://usn.ubuntu.com/5321-1/","reference_id":"USN-5321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-1/"},{"reference_url":"https://usn.ubuntu.com/5321-2/","reference_id":"USN-5321-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-0843"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5up1-n726-hbg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46628?format=json","vulnerability_id":"VCID-6ada-6td5-gyfn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34473","reference_id":"","reference_type":"","scores":[{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67875","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.6766","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67784","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67822","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67792","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67817","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67681","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.6775","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67702","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67738","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67751","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67762","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00542","scoring_system":"epss","scoring_elements":"0.67765","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34473"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770888","reference_id":"show_bug.cgi?id=1770888","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:32:28Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770888"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34473"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6ada-6td5-gyfn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46632?format=json","vulnerability_id":"VCID-74b7-rp1u-23hv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34477","reference_id":"","reference_type":"","scores":[{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57797","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57704","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57646","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57691","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57754","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57701","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57729","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57725","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57755","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57773","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57752","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57762","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57735","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57694","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57692","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34477"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:15:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1731614","reference_id":"show_bug.cgi?id=1731614","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:15:38Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1731614"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34477"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-74b7-rp1u-23hv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31206?format=json","vulnerability_id":"VCID-7acy-1dnk-pkcq","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31747.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31747.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31747","reference_id":"","reference_type":"","scores":[{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71223","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.7105","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71035","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71018","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71064","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71107","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.7112","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71102","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71141","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71177","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.7114","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71166","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.70978","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.70995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.7097","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71012","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71027","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092026","reference_id":"2092026","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092026"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.archlinux.org/AVG-2761","reference_id":"AVG-2761","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2761"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1760765%2C1765610%2C1766283%2C1767365%2C1768559%2C1768734","reference_id":"buglist.cgi?bug_id=1760765%2C1765610%2C1766283%2C1767365%2C1768559%2C1768734","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1760765%2C1765610%2C1766283%2C1767365%2C1768559%2C1768734"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-21/","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-22/","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:22:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4870","reference_id":"RHSA-2022:4870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4871","reference_id":"RHSA-2022:4871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4872","reference_id":"RHSA-2022:4872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4873","reference_id":"RHSA-2022:4873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4875","reference_id":"RHSA-2022:4875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4876","reference_id":"RHSA-2022:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4887","reference_id":"RHSA-2022:4887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4888","reference_id":"RHSA-2022:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4889","reference_id":"RHSA-2022:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4890","reference_id":"RHSA-2022:4890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4891","reference_id":"RHSA-2022:4891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4892","reference_id":"RHSA-2022:4892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4892"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31747"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7acy-1dnk-pkcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31209?format=json","vulnerability_id":"VCID-7p9y-82kb-r7h3","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34472.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34472","reference_id":"","reference_type":"","scores":[{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64085","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63914","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63949","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63959","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6398","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63978","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6395","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63994","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64041","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64008","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64033","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63896","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63923","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6388","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63931","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63961","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102166","reference_id":"2102166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102166"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770123","reference_id":"show_bug.cgi?id=1770123","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:41:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770123"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34472"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7p9y-82kb-r7h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46621?format=json","vulnerability_id":"VCID-7tc4-d3hr-bubf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31743","reference_id":"","reference_type":"","scores":[{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.70064","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69969","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.6997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69946","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69988","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.70018","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.70015","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69827","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69842","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69819","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69883","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.6989","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69876","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69926","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00615","scoring_system":"epss","scoring_elements":"0.69959","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31743"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:29:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1747388","reference_id":"show_bug.cgi?id=1747388","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:29:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1747388"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31743"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7tc4-d3hr-bubf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46623?format=json","vulnerability_id":"VCID-8hrt-1yt3-1bh3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31745","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45068","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45045","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4494","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45007","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45025","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.44966","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.44993","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45186","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56579","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31745"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:26:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1760944","reference_id":"show_bug.cgi?id=1760944","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:26:18Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1760944"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31745"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hrt-1yt3-1bh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46603?format=json","vulnerability_id":"VCID-8uk6-x62z-uybr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2505.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2505.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2505","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43795","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43757","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4379","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.4377","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43782","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43715","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44932","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.44859","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45271","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00226","scoring_system":"epss","scoring_elements":"0.45278","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46727","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46783","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46763","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.46699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00237","scoring_system":"epss","scoring_elements":"0.4679","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2505"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2111910","reference_id":"2111910","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2111910"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1769739%2C1772824","reference_id":"buglist.cgi?bug_id=1769739%2C1772824","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1769739%2C1772824"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-28/","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-28/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-30","reference_id":"mfsa2022-30","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-30/","reference_id":"mfsa2022-30","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-32","reference_id":"mfsa2022-32","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-32"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-32/","reference_id":"mfsa2022-32","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:58:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-32/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5765","reference_id":"RHSA-2022:5765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5766","reference_id":"RHSA-2022:5766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5767","reference_id":"RHSA-2022:5767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5769","reference_id":"RHSA-2022:5769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5770","reference_id":"RHSA-2022:5770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5771","reference_id":"RHSA-2022:5771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5772","reference_id":"RHSA-2022:5772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5773","reference_id":"RHSA-2022:5773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5774","reference_id":"RHSA-2022:5774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5776","reference_id":"RHSA-2022:5776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5777","reference_id":"RHSA-2022:5777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5778","reference_id":"RHSA-2022:5778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5778"},{"reference_url":"https://usn.ubuntu.com/5536-1/","reference_id":"USN-5536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5536-1/"},{"reference_url":"https://usn.ubuntu.com/5663-1/","reference_id":"USN-5663-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5663-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-2505"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8uk6-x62z-uybr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31205?format=json","vulnerability_id":"VCID-9tdt-84zg-3fd7","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31742.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31742.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31742","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58068","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5801","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57989","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5802","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57996","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5796","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57959","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57915","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58019","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57969","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57998","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57958","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58013","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092025","reference_id":"2092025","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092025"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.archlinux.org/AVG-2761","reference_id":"AVG-2761","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2761"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-21/","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-22/","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4870","reference_id":"RHSA-2022:4870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4871","reference_id":"RHSA-2022:4871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4872","reference_id":"RHSA-2022:4872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4873","reference_id":"RHSA-2022:4873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4875","reference_id":"RHSA-2022:4875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4876","reference_id":"RHSA-2022:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4887","reference_id":"RHSA-2022:4887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4888","reference_id":"RHSA-2022:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4889","reference_id":"RHSA-2022:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4890","reference_id":"RHSA-2022:4890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4891","reference_id":"RHSA-2022:4891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4892","reference_id":"RHSA-2022:4892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1730434","reference_id":"show_bug.cgi?id=1730434","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:36:32Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1730434"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31742"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9tdt-84zg-3fd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31155?format=json","vulnerability_id":"VCID-9tkb-9fch-67bc","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1802.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1802","reference_id":"","reference_type":"","scores":[{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98576","published_at":"2026-04-01T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98611","published_at":"2026-05-14T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98597","published_at":"2026-04-18T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.986","published_at":"2026-04-26T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98601","published_at":"2026-04-29T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98606","published_at":"2026-05-11T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98607","published_at":"2026-05-07T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98608","published_at":"2026-05-12T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98583","published_at":"2026-04-07T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98586","published_at":"2026-04-08T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.67932","scoring_system":"epss","scoring_elements":"0.98591","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089217","reference_id":"2089217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2089217"},{"reference_url":"https://security.archlinux.org/AVG-2728","reference_id":"AVG-2728","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2728"},{"reference_url":"https://security.archlinux.org/AVG-2729","reference_id":"AVG-2729","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2729"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-19","reference_id":"mfsa2022-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-19"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-19/","reference_id":"mfsa2022-19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:16:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-19/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4729","reference_id":"RHSA-2022:4729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4730","reference_id":"RHSA-2022:4730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4765","reference_id":"RHSA-2022:4765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4766","reference_id":"RHSA-2022:4766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4767","reference_id":"RHSA-2022:4767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4768","reference_id":"RHSA-2022:4768","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4769","reference_id":"RHSA-2022:4769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4770","reference_id":"RHSA-2022:4770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4772","reference_id":"RHSA-2022:4772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4773","reference_id":"RHSA-2022:4773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4774","reference_id":"RHSA-2022:4774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4776","reference_id":"RHSA-2022:4776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4776"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770137","reference_id":"show_bug.cgi?id=1770137","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T15:16:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1770137"},{"reference_url":"https://usn.ubuntu.com/5434-1/","reference_id":"USN-5434-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5434-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-1802"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9tkb-9fch-67bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31214?format=json","vulnerability_id":"VCID-9tnj-j5xv-43cm","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36318.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36318.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36318","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41542","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41468","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41637","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41692","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41718","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41682","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43133","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43178","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43194","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43102","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43233","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4331","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2111908","reference_id":"2111908","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2111908"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-28/","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-28/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-29","reference_id":"mfsa2022-29","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-29/","reference_id":"mfsa2022-29","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-30","reference_id":"mfsa2022-30","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-30/","reference_id":"mfsa2022-30","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-31","reference_id":"mfsa2022-31","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-31/","reference_id":"mfsa2022-31","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-32","reference_id":"mfsa2022-32","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-32"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-32/","reference_id":"mfsa2022-32","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-32/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5765","reference_id":"RHSA-2022:5765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5766","reference_id":"RHSA-2022:5766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5767","reference_id":"RHSA-2022:5767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5769","reference_id":"RHSA-2022:5769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5770","reference_id":"RHSA-2022:5770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5771","reference_id":"RHSA-2022:5771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5772","reference_id":"RHSA-2022:5772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5773","reference_id":"RHSA-2022:5773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5774","reference_id":"RHSA-2022:5774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5776","reference_id":"RHSA-2022:5776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5777","reference_id":"RHSA-2022:5777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5778","reference_id":"RHSA-2022:5778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5778"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1771774","reference_id":"show_bug.cgi?id=1771774","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T17:05:19Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1771774"},{"reference_url":"https://usn.ubuntu.com/5536-1/","reference_id":"USN-5536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5536-1/"},{"reference_url":"https://usn.ubuntu.com/5663-1/","reference_id":"USN-5663-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5663-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-36318"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9tnj-j5xv-43cm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31199?format=json","vulnerability_id":"VCID-a2nq-ss2f-bqac","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29917.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29917.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29917","reference_id":"","reference_type":"","scores":[{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5732","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57311","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57291","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5727","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57294","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57274","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57223","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57246","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57176","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5722","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57283","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.5723","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57255","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57243","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57267","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57244","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00346","scoring_system":"epss","scoring_elements":"0.57296","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081473","reference_id":"2081473","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081473"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://security.archlinux.org/AVG-2710","reference_id":"AVG-2710","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2710"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1684739%2C1706441%2C1753298%2C1762614%2C1762620%2C1764778","reference_id":"buglist.cgi?bug_id=1684739%2C1706441%2C1753298%2C1762614%2C1762620%2C1764778","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1684739%2C1706441%2C1753298%2C1762614%2C1762620%2C1764778"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-17/","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-18/","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:06:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1701","reference_id":"RHSA-2022:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1702","reference_id":"RHSA-2022:1702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1703","reference_id":"RHSA-2022:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1704","reference_id":"RHSA-2022:1704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1705","reference_id":"RHSA-2022:1705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1724","reference_id":"RHSA-2022:1724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1725","reference_id":"RHSA-2022:1725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1726","reference_id":"RHSA-2022:1726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1727","reference_id":"RHSA-2022:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1730","reference_id":"RHSA-2022:1730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4589","reference_id":"RHSA-2022:4589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4590","reference_id":"RHSA-2022:4590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4590"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29917"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a2nq-ss2f-bqac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46622?format=json","vulnerability_id":"VCID-ahzj-vepp-r3f4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31744.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31744.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31744","reference_id":"","reference_type":"","scores":[{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20143","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20144","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2014","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20253","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20171","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20367","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.2009","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23196","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23118","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23544","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23591","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23524","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23564","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102165","reference_id":"2102165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102165"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1757604","reference_id":"show_bug.cgi?id=1757604","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:28:40Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1757604"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31744"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahzj-vepp-r3f4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46604?format=json","vulnerability_id":"VCID-b3rt-2zdj-4bct","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26382","reference_id":"","reference_type":"","scores":[{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52772","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52705","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52665","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52609","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52661","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52706","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52671","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52697","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52659","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52685","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52695","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52746","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52729","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52713","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52752","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52743","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2714","reference_id":"AVG-2714","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2714"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-10/","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:26:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-10/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1741888","reference_id":"show_bug.cgi?id=1741888","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:26:09Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1741888"},{"reference_url":"https://usn.ubuntu.com/5321-1/","reference_id":"USN-5321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-1/"},{"reference_url":"https://usn.ubuntu.com/5321-2/","reference_id":"USN-5321-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26382"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b3rt-2zdj-4bct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46608?format=json","vulnerability_id":"VCID-c9mk-pbph-jfbn","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28287","reference_id":"","reference_type":"","scores":[{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57695","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57589","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57608","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57587","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57544","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57601","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57628","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57599","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.5762","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57648","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57652","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57667","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57646","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57656","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:01:25Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1741515","reference_id":"show_bug.cgi?id=1741515","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:01:25Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1741515"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28287"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mk-pbph-jfbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31181?format=json","vulnerability_id":"VCID-cqpd-wav4-pubn","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26381.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26381","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40814","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4077","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40789","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40796","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40805","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40798","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.4054","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40465","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42167","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42033","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42017","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.41943","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42085","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.42172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00202","scoring_system":"epss","scoring_elements":"0.41948","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062223","reference_id":"2062223","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062223"},{"reference_url":"https://security.archlinux.org/AVG-2713","reference_id":"AVG-2713","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2713"},{"reference_url":"https://security.archlinux.org/AVG-2714","reference_id":"AVG-2714","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2714"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-10/","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-10/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-11/","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-11/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-12/","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-12/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1736243","reference_id":"show_bug.cgi?id=1736243","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:27:14Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1736243"},{"reference_url":"https://usn.ubuntu.com/5321-1/","reference_id":"USN-5321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-1/"},{"reference_url":"https://usn.ubuntu.com/5321-2/","reference_id":"USN-5321-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-2/"},{"reference_url":"https://usn.ubuntu.com/5345-1/","reference_id":"USN-5345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5345-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26381"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cqpd-wav4-pubn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46633?format=json","vulnerability_id":"VCID-dcw1-cagp-mkd5","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34480.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34480","reference_id":"","reference_type":"","scores":[{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63078","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63163","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63156","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63124","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63159","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00438","scoring_system":"epss","scoring_elements":"0.63141","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63329","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63274","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64511","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64526","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64556","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64491","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64489","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64463","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34480"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359028","reference_id":"2359028","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359028"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:54:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1454072","reference_id":"show_bug.cgi?id=1454072","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:54:01Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1454072"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5506-1/","reference_id":"USN-5506-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5506-1/"},{"reference_url":"https://usn.ubuntu.com/5872-1/","reference_id":"USN-5872-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5872-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34480"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dcw1-cagp-mkd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31198?format=json","vulnerability_id":"VCID-dg61-9h8j-tkfj","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29916.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29916.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29916","reference_id":"","reference_type":"","scores":[{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47801","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47871","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47895","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47882","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47937","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47885","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47824","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.4774","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47828","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47771","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47874","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47823","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00246","scoring_system":"epss","scoring_elements":"0.47876","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081470","reference_id":"2081470","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081470"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://security.archlinux.org/AVG-2710","reference_id":"AVG-2710","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2710"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-17/","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-18/","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1701","reference_id":"RHSA-2022:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1702","reference_id":"RHSA-2022:1702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1703","reference_id":"RHSA-2022:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1704","reference_id":"RHSA-2022:1704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1705","reference_id":"RHSA-2022:1705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1724","reference_id":"RHSA-2022:1724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1725","reference_id":"RHSA-2022:1725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1726","reference_id":"RHSA-2022:1726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1727","reference_id":"RHSA-2022:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1730","reference_id":"RHSA-2022:1730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4589","reference_id":"RHSA-2022:4589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4590","reference_id":"RHSA-2022:4590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4590"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1760674","reference_id":"show_bug.cgi?id=1760674","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:07:07Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1760674"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29916"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dg61-9h8j-tkfj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46626?format=json","vulnerability_id":"VCID-dq19-byye-fuag","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34469","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19264","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19477","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19097","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18989","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1907","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19166","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1913","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19319","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19371","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19375","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19326","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19268","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19231","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19251","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1915","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34469"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:18:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1721220","reference_id":"show_bug.cgi?id=1721220","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:18:21Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1721220"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34469"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dq19-byye-fuag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31203?format=json","vulnerability_id":"VCID-dqhd-ay8b-wfam","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31740.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31740.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31740","reference_id":"","reference_type":"","scores":[{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47623","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47671","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47679","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47592","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47636","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47612","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00243","scoring_system":"epss","scoring_elements":"0.47561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47681","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47607","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49291","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49205","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49255","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49227","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.49164","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00259","scoring_system":"epss","scoring_elements":"0.4925","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092023","reference_id":"2092023","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092023"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-21/","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-22/","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4870","reference_id":"RHSA-2022:4870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4871","reference_id":"RHSA-2022:4871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4872","reference_id":"RHSA-2022:4872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4873","reference_id":"RHSA-2022:4873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4875","reference_id":"RHSA-2022:4875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4876","reference_id":"RHSA-2022:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4887","reference_id":"RHSA-2022:4887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4888","reference_id":"RHSA-2022:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4889","reference_id":"RHSA-2022:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4890","reference_id":"RHSA-2022:4890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4891","reference_id":"RHSA-2022:4891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4892","reference_id":"RHSA-2022:4892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806","reference_id":"show_bug.cgi?id=1766806","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:51:22Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5494-1/","reference_id":"USN-5494-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5494-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31740"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqhd-ay8b-wfam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46602?format=json","vulnerability_id":"VCID-fj49-kvwy-bycm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1919","reference_id":"","reference_type":"","scores":[{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65341","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65087","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65263","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65285","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65137","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65129","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65197","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65204","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65214","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.6521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65222","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65202","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00482","scoring_system":"epss","scoring_elements":"0.65294","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1919"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-1919"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fj49-kvwy-bycm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46627?format=json","vulnerability_id":"VCID-g83q-g16g-wqc2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34471","reference_id":"","reference_type":"","scores":[{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38439","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3835","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38421","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38433","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38342","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38365","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.3879","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38842","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38854","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38802","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38848","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38826","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38746","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38556","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00174","scoring_system":"epss","scoring_elements":"0.38468","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34471"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:48:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1766047","reference_id":"show_bug.cgi?id=1766047","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:48:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1766047"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34471"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g83q-g16g-wqc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31197?format=json","vulnerability_id":"VCID-gfve-nzmn-dbbd","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29914.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29914","reference_id":"","reference_type":"","scores":[{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47272","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47302","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47276","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47334","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47284","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47229","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47145","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47209","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47171","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47203","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47261","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4728","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47227","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081468","reference_id":"2081468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081468"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://security.archlinux.org/AVG-2710","reference_id":"AVG-2710","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2710"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-17/","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-18/","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1701","reference_id":"RHSA-2022:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1702","reference_id":"RHSA-2022:1702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1703","reference_id":"RHSA-2022:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1704","reference_id":"RHSA-2022:1704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1705","reference_id":"RHSA-2022:1705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1724","reference_id":"RHSA-2022:1724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1725","reference_id":"RHSA-2022:1725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1726","reference_id":"RHSA-2022:1726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1727","reference_id":"RHSA-2022:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1730","reference_id":"RHSA-2022:1730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4589","reference_id":"RHSA-2022:4589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4590","reference_id":"RHSA-2022:4590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4590"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1746448","reference_id":"show_bug.cgi?id=1746448","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:58:16Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1746448"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29914"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gfve-nzmn-dbbd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31212?format=json","vulnerability_id":"VCID-gxfx-4gxp-3kdw","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34481.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34481.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34481","reference_id":"","reference_type":"","scores":[{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43603","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43668","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43629","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43678","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43666","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43646","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43642","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43591","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43519","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43454","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4512","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.44991","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45049","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45032","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.44966","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45068","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45127","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102164","reference_id":"2102164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102164"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1497246","reference_id":"show_bug.cgi?id=1497246","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:53:12Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1497246"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34481"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gxfx-4gxp-3kdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31191?format=json","vulnerability_id":"VCID-hsr3-c152-nucq","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28286.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28286.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28286","reference_id":"","reference_type":"","scores":[{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41056","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41318","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41323","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41331","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41352","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41321","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41351","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41249","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4098","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42669","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42868","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42869","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42787","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42647","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.42723","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00206","scoring_system":"epss","scoring_elements":"0.4274","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072564","reference_id":"2072564","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072564"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.archlinux.org/AVG-2712","reference_id":"AVG-2712","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2712"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-14/","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-14/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-15/","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-15/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1283","reference_id":"RHSA-2022:1283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1284","reference_id":"RHSA-2022:1284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1285","reference_id":"RHSA-2022:1285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1286","reference_id":"RHSA-2022:1286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1287","reference_id":"RHSA-2022:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1301","reference_id":"RHSA-2022:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1302","reference_id":"RHSA-2022:1302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1303","reference_id":"RHSA-2022:1303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1305","reference_id":"RHSA-2022:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1326","reference_id":"RHSA-2022:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1326"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1735265","reference_id":"show_bug.cgi?id=1735265","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:02:32Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1735265"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"},{"reference_url":"https://usn.ubuntu.com/5393-1/","reference_id":"USN-5393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28286"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hsr3-c152-nucq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31211?format=json","vulnerability_id":"VCID-husj-kjf4-ufeq","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34479.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34479.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34479","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39806","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40157","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40182","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40172","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40126","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40176","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40066","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39735","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41163","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41384","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41379","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41301","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41167","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4124","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41257","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102161","reference_id":"2102161","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102161"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1745595","reference_id":"show_bug.cgi?id=1745595","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:09:26Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1745595"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34479"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-husj-kjf4-ufeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31195?format=json","vulnerability_id":"VCID-j1zj-1dr1-8yhc","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29912.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29912.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29912","reference_id":"","reference_type":"","scores":[{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58405","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00362","scoring_system":"epss","scoring_elements":"0.58337","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00385","scoring_system":"epss","scoring_elements":"0.59743","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67373","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67386","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67407","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.6736","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67394","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67406","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67414","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67433","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67472","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00533","scoring_system":"epss","scoring_elements":"0.67321","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081472","reference_id":"2081472","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081472"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://security.archlinux.org/AVG-2710","reference_id":"AVG-2710","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2710"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-17/","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-18/","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1701","reference_id":"RHSA-2022:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1702","reference_id":"RHSA-2022:1702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1703","reference_id":"RHSA-2022:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1704","reference_id":"RHSA-2022:1704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1705","reference_id":"RHSA-2022:1705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1724","reference_id":"RHSA-2022:1724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1725","reference_id":"RHSA-2022:1725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1726","reference_id":"RHSA-2022:1726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1727","reference_id":"RHSA-2022:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1730","reference_id":"RHSA-2022:1730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4589","reference_id":"RHSA-2022:4589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4590","reference_id":"RHSA-2022:4590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4590"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1692655","reference_id":"show_bug.cgi?id=1692655","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:01:23Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1692655"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29912"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j1zj-1dr1-8yhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31213?format=json","vulnerability_id":"VCID-jg37-y3r7-8fcq","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34484.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34484.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34484","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51357","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51263","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51349","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51308","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51322","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51343","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51303","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51248","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51403","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51327","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53112","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53096","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.5313","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53088","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53038","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53084","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53122","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34484"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102169","reference_id":"2102169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102169"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651","reference_id":"buglist.cgi?bug_id=1763634%2C1772651","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1763634%2C1772651"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34484"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jg37-y3r7-8fcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31192?format=json","vulnerability_id":"VCID-mw9j-h66p-k7as","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28289.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28289.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28289","reference_id":"","reference_type":"","scores":[{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58932","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.5895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58915","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58934","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58887","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58952","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58909","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00371","scoring_system":"epss","scoring_elements":"0.58876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59095","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00372","scoring_system":"epss","scoring_elements":"0.59024","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60408","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.6046","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60402","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60355","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60396","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60393","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00395","scoring_system":"epss","scoring_elements":"0.60417","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28289"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072566","reference_id":"2072566","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072566"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.archlinux.org/AVG-2712","reference_id":"AVG-2712","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2712"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776","reference_id":"buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1663508%2C1744525%2C1753508%2C1757476%2C1757805%2C1758549%2C1758776"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-14/","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-14/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-15/","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T13:59:30Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-15/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1283","reference_id":"RHSA-2022:1283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1284","reference_id":"RHSA-2022:1284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1285","reference_id":"RHSA-2022:1285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1286","reference_id":"RHSA-2022:1286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1287","reference_id":"RHSA-2022:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1301","reference_id":"RHSA-2022:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1302","reference_id":"RHSA-2022:1302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1303","reference_id":"RHSA-2022:1303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1305","reference_id":"RHSA-2022:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1326","reference_id":"RHSA-2022:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1326"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"},{"reference_url":"https://usn.ubuntu.com/5393-1/","reference_id":"USN-5393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28289"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mw9j-h66p-k7as"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31186?format=json","vulnerability_id":"VCID-mwd4-pgxg-zkha","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26485.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26485","reference_id":"","reference_type":"","scores":[{"value":"0.06126","scoring_system":"epss","scoring_elements":"0.90758","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06126","scoring_system":"epss","scoring_elements":"0.90769","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91662","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91625","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91638","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91648","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91646","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91582","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91588","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91594","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91614","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91609","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0719","scoring_system":"epss","scoring_elements":"0.91615","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061736","reference_id":"2061736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061736"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-09","reference_id":"mfsa2022-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-09"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-09/","reference_id":"mfsa2022-09","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:32:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-09/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1758062","reference_id":"show_bug.cgi?id=1758062","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:32:55Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1758062"},{"reference_url":"https://usn.ubuntu.com/5314-1/","reference_id":"USN-5314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5314-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26485"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwd4-pgxg-zkha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46629?format=json","vulnerability_id":"VCID-ndtj-s8ud-57gu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34474","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46854","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46727","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46791","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46754","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46785","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46867","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46816","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46892","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46928","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46868","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46817","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34474"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:31:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1677138","reference_id":"show_bug.cgi?id=1677138","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T19:31:13Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1677138"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34474"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ndtj-s8ud-57gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46624?format=json","vulnerability_id":"VCID-nxhd-we9n-67fe","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31748","reference_id":"","reference_type":"","scores":[{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68524","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.6842","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.6844","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68476","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68468","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68378","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68372","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68416","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31748"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1713773%2C1762201%2C1762469%2C1762770%2C1764878%2C1765226%2C1765782%2C1765973%2C1767177%2C1767181%2C1768232%2C1768251%2C1769869","reference_id":"buglist.cgi?bug_id=1713773%2C1762201%2C1762469%2C1762770%2C1764878%2C1765226%2C1765782%2C1765973%2C1767177%2C1767181%2C1768232%2C1768251%2C1769869","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:21:24Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1713773%2C1762201%2C1762469%2C1762770%2C1764878%2C1765226%2C1765782%2C1765973%2C1767177%2C1767181%2C1768232%2C1768251%2C1769869"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:21:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31748"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nxhd-we9n-67fe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46613?format=json","vulnerability_id":"VCID-phf8-uzdb-vber","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29910","reference_id":"","reference_type":"","scores":[{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47915","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47965","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47936","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47853","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47919","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47943","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47885","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47986","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47987","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.48005","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47993","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.48046","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.48041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47997","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47978","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47989","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29910"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:45:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1757138","reference_id":"show_bug.cgi?id=1757138","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:45:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1757138"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29910"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-phf8-uzdb-vber"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31187?format=json","vulnerability_id":"VCID-pzf5-v82a-hkb9","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26486.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26486.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26486","reference_id":"","reference_type":"","scores":[{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90273","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90215","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90255","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90249","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90259","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.9015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90187","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90196","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90195","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.9019","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90208","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90205","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90219","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05458","scoring_system":"epss","scoring_elements":"0.90218","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26486"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061735","reference_id":"2061735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2061735"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-09","reference_id":"mfsa2022-09","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-09"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-09/","reference_id":"mfsa2022-09","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:24:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-09/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1758070","reference_id":"show_bug.cgi?id=1758070","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:24:00Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1758070"},{"reference_url":"https://usn.ubuntu.com/5314-1/","reference_id":"USN-5314-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5314-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26486"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzf5-v82a-hkb9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46606?format=json","vulnerability_id":"VCID-qa7k-byax-9ugc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28283","reference_id":"","reference_type":"","scores":[{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55453","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55359","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.5535","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55407","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55368","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55393","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55383","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55408","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55386","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55437","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55448","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00323","scoring_system":"epss","scoring_elements":"0.55444","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28283"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:14:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1754066","reference_id":"show_bug.cgi?id=1754066","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:14:12Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1754066"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28283"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qa7k-byax-9ugc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46610?format=json","vulnerability_id":"VCID-qfk6-r2rj-9yd2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28288","reference_id":"","reference_type":"","scores":[{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61053","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60958","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.6095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60899","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60948","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.61007","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.6097","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60996","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60876","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60869","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60918","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60934","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60956","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60942","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60965","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60971","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00404","scoring_system":"epss","scoring_elements":"0.60946","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28288"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746415%2C1746495%2C1746500%2C1747282%2C1748759%2C1749056%2C1749786%2C1751679%2C1752120%2C1756010%2C1756017%2C1757213%2C1757258%2C1757427","reference_id":"buglist.cgi?bug_id=1746415%2C1746495%2C1746500%2C1747282%2C1748759%2C1749056%2C1749786%2C1751679%2C1752120%2C1756010%2C1756017%2C1757213%2C1757258%2C1757427","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:00:32Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746415%2C1746495%2C1746500%2C1747282%2C1748759%2C1749056%2C1749786%2C1751679%2C1752120%2C1756010%2C1756017%2C1757213%2C1757258%2C1757427"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-16T14:00:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28288"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qfk6-r2rj-9yd2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31185?format=json","vulnerability_id":"VCID-qh4a-bn9p-a7hh","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26387.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26387","reference_id":"","reference_type":"","scores":[{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29387","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29741","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29777","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29307","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30414","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30346","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30422","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30684","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30567","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30483","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30343","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26387"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062222","reference_id":"2062222","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062222"},{"reference_url":"https://security.archlinux.org/AVG-2713","reference_id":"AVG-2713","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2713"},{"reference_url":"https://security.archlinux.org/AVG-2714","reference_id":"AVG-2714","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2714"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-10/","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-10/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-11/","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-11/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-12/","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-12/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1752979","reference_id":"show_bug.cgi?id=1752979","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T20:10:36Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1752979"},{"reference_url":"https://usn.ubuntu.com/5321-1/","reference_id":"USN-5321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-1/"},{"reference_url":"https://usn.ubuntu.com/5321-2/","reference_id":"USN-5321-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-2/"},{"reference_url":"https://usn.ubuntu.com/5345-1/","reference_id":"USN-5345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5345-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26387"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qh4a-bn9p-a7hh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31194?format=json","vulnerability_id":"VCID-r587-gyj4-5kee","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29911.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29911","reference_id":"","reference_type":"","scores":[{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54829","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54762","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54735","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54754","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54678","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54721","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54776","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54738","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54765","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.5475","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00317","scoring_system":"epss","scoring_elements":"0.54771","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081471","reference_id":"2081471","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081471"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://security.archlinux.org/AVG-2710","reference_id":"AVG-2710","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2710"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-17/","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-18/","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1701","reference_id":"RHSA-2022:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1702","reference_id":"RHSA-2022:1702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1703","reference_id":"RHSA-2022:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1704","reference_id":"RHSA-2022:1704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1705","reference_id":"RHSA-2022:1705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1724","reference_id":"RHSA-2022:1724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1725","reference_id":"RHSA-2022:1725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1726","reference_id":"RHSA-2022:1726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1727","reference_id":"RHSA-2022:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1730","reference_id":"RHSA-2022:1730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4589","reference_id":"RHSA-2022:4589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4590","reference_id":"RHSA-2022:4590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4590"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981","reference_id":"show_bug.cgi?id=1761981","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T13:58:31Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29911"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r587-gyj4-5kee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31189?format=json","vulnerability_id":"VCID-r631-9h74-sygv","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28282.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28282.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28282","reference_id":"","reference_type":"","scores":[{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.9002","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.90023","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.90007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.90013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.90015","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.89967","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.90006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.90001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.89979","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05281","scoring_system":"epss","scoring_elements":"0.89985","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05294","scoring_system":"epss","scoring_elements":"0.90105","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05294","scoring_system":"epss","scoring_elements":"0.90091","published_at":"2026-05-12T12:55:00Z"},{"value":"0.056","scoring_system":"epss","scoring_elements":"0.90344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.056","scoring_system":"epss","scoring_elements":"0.90369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.056","scoring_system":"epss","scoring_elements":"0.90352","published_at":"2026-05-05T12:55:00Z"},{"value":"0.056","scoring_system":"epss","scoring_elements":"0.9034","published_at":"2026-04-29T12:55:00Z"},{"value":"0.056","scoring_system":"epss","scoring_elements":"0.90345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.056","scoring_system":"epss","scoring_elements":"0.90376","published_at":"2026-05-11T12:55:00Z"},{"value":"0.056","scoring_system":"epss","scoring_elements":"0.9038","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072562","reference_id":"2072562","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072562"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.archlinux.org/AVG-2712","reference_id":"AVG-2712","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2712"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-14/","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-14/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-15/","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-15/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1283","reference_id":"RHSA-2022:1283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1284","reference_id":"RHSA-2022:1284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1285","reference_id":"RHSA-2022:1285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1286","reference_id":"RHSA-2022:1286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1287","reference_id":"RHSA-2022:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1301","reference_id":"RHSA-2022:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1302","reference_id":"RHSA-2022:1302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1303","reference_id":"RHSA-2022:1303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1305","reference_id":"RHSA-2022:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1326","reference_id":"RHSA-2022:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1326"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1751609","reference_id":"show_bug.cgi?id=1751609","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:08:53Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1751609"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"},{"reference_url":"https://usn.ubuntu.com/5393-1/","reference_id":"USN-5393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28282"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r631-9h74-sygv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46639?format=json","vulnerability_id":"VCID-sd2d-m1n5-8kdg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36320","reference_id":"","reference_type":"","scores":[{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66477","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.6641","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66482","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66481","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66446","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66469","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00511","scoring_system":"epss","scoring_elements":"0.66489","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.6671","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00513","scoring_system":"epss","scoring_elements":"0.66644","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67856","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67865","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67896","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67824","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67834","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00545","scoring_system":"epss","scoring_elements":"0.67814","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36320"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1759794%2C1760998","reference_id":"buglist.cgi?bug_id=1759794%2C1760998","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T16:55:17Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1759794%2C1760998"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-28/","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T16:55:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-28/"},{"reference_url":"https://usn.ubuntu.com/5536-1/","reference_id":"USN-5536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5536-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-36320"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sd2d-m1n5-8kdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31207?format=json","vulnerability_id":"VCID-sm2q-bg6f-4qag","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34468.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34468","reference_id":"","reference_type":"","scores":[{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.67091","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66946","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.6696","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66978","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66991","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.67031","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.67003","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.67026","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66903","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66924","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66937","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66944","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66913","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102163","reference_id":"2102163","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102163"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1768537","reference_id":"show_bug.cgi?id=1768537","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:20:14Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1768537"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34468"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sm2q-bg6f-4qag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31150?format=json","vulnerability_id":"VCID-t98b-d1uu-pkan","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1196.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1196.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1196","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41665","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41739","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41729","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41732","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41684","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41573","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41497","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43339","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43166","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43227","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4321","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43134","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43265","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43342","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072561","reference_id":"2072561","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072561"},{"reference_url":"https://security.archlinux.org/AVG-2712","reference_id":"AVG-2712","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2712"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-14/","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-14/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-15/","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-15/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1283","reference_id":"RHSA-2022:1283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1284","reference_id":"RHSA-2022:1284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1285","reference_id":"RHSA-2022:1285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1286","reference_id":"RHSA-2022:1286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1287","reference_id":"RHSA-2022:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1301","reference_id":"RHSA-2022:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1302","reference_id":"RHSA-2022:1302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1303","reference_id":"RHSA-2022:1303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1305","reference_id":"RHSA-2022:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1326","reference_id":"RHSA-2022:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1326"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1750679","reference_id":"show_bug.cgi?id=1750679","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T15:27:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1750679"},{"reference_url":"https://usn.ubuntu.com/5393-1/","reference_id":"USN-5393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-1196"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t98b-d1uu-pkan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46637?format=json","vulnerability_id":"VCID-utn2-nt3q-fugv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36315","reference_id":"","reference_type":"","scores":[{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36888","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36394","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36279","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36353","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36381","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36297","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36319","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36919","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36752","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36803","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36818","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36827","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36813","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36796","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36737","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36514","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36395","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36315"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-28/","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:19:25Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-28/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1762520","reference_id":"show_bug.cgi?id=1762520","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:19:25Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1762520"},{"reference_url":"https://usn.ubuntu.com/5536-1/","reference_id":"USN-5536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5536-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-36315"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-utn2-nt3q-fugv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31208?format=json","vulnerability_id":"VCID-v865-5aar-sueu","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34470.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34470.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34470","reference_id":"","reference_type":"","scores":[{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70677","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7073","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70762","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70753","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70793","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7083","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70796","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70824","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70644","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70682","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.70705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00645","scoring_system":"epss","scoring_elements":"0.7069","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102162","reference_id":"2102162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102162"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1765951","reference_id":"show_bug.cgi?id=1765951","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-15T18:51:07Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1765951"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34470"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v865-5aar-sueu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31193?format=json","vulnerability_id":"VCID-vd6g-ywvd-gfhf","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29909.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29909.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29909","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41551","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41809","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41819","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41842","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41796","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41747","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41674","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41595","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41455","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41524","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4154","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41451","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41476","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41801","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41759","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081469","reference_id":"2081469","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2081469"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://security.archlinux.org/AVG-2710","reference_id":"AVG-2710","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2710"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-17"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-17/","reference_id":"mfsa2022-17","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-17/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-18"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-18/","reference_id":"mfsa2022-18","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-18/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1701","reference_id":"RHSA-2022:1701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1701"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1702","reference_id":"RHSA-2022:1702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1703","reference_id":"RHSA-2022:1703","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1703"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1704","reference_id":"RHSA-2022:1704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1705","reference_id":"RHSA-2022:1705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1724","reference_id":"RHSA-2022:1724","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1724"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1725","reference_id":"RHSA-2022:1725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1726","reference_id":"RHSA-2022:1726","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1726"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1727","reference_id":"RHSA-2022:1727","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1727"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1730","reference_id":"RHSA-2022:1730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4589","reference_id":"RHSA-2022:4589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4590","reference_id":"RHSA-2022:4590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4590"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1755081","reference_id":"show_bug.cgi?id=1755081","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T13:47:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1755081"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"},{"reference_url":"https://usn.ubuntu.com/5435-1/","reference_id":"USN-5435-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5435-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29909"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vd6g-ywvd-gfhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31200?format=json","vulnerability_id":"VCID-vg6v-8pv2-mfhf","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31736.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-31736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31736","reference_id":"","reference_type":"","scores":[{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.4389","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44023","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43953","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44004","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44006","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43989","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44035","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.4396","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43822","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45483","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45427","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45565","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45505","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.454","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00229","scoring_system":"epss","scoring_elements":"0.45464","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092018","reference_id":"2092018","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092018"},{"reference_url":"https://security.archlinux.org/AVG-2760","reference_id":"AVG-2760","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2760"},{"reference_url":"https://security.archlinux.org/AVG-2761","reference_id":"AVG-2761","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2761"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-20"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-20/","reference_id":"mfsa2022-20","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-20/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-21"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-21/","reference_id":"mfsa2022-21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-21/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-22/","reference_id":"mfsa2022-22","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-22/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4870","reference_id":"RHSA-2022:4870","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4871","reference_id":"RHSA-2022:4871","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4871"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4872","reference_id":"RHSA-2022:4872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4872"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4873","reference_id":"RHSA-2022:4873","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4873"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4875","reference_id":"RHSA-2022:4875","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4875"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4876","reference_id":"RHSA-2022:4876","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4887","reference_id":"RHSA-2022:4887","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4887"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4888","reference_id":"RHSA-2022:4888","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4889","reference_id":"RHSA-2022:4889","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4889"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4890","reference_id":"RHSA-2022:4890","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4890"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4891","reference_id":"RHSA-2022:4891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4892","reference_id":"RHSA-2022:4892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1735923","reference_id":"show_bug.cgi?id=1735923","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:56:54Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1735923"},{"reference_url":"https://usn.ubuntu.com/5475-1/","reference_id":"USN-5475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5475-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-31736"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vg6v-8pv2-mfhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31215?format=json","vulnerability_id":"VCID-vgqa-e7yg-wygj","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36319.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-36319.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36319","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35488","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35514","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35504","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35551","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35048","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35117","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36378","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3635","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36392","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3651","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36293","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-36319"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2111907","reference_id":"2111907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2111907"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-28/","reference_id":"mfsa2022-28","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-28/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-29","reference_id":"mfsa2022-29","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-29/","reference_id":"mfsa2022-29","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-30","reference_id":"mfsa2022-30","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-30/","reference_id":"mfsa2022-30","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-31","reference_id":"mfsa2022-31","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-31/","reference_id":"mfsa2022-31","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-32","reference_id":"mfsa2022-32","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-32"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-32/","reference_id":"mfsa2022-32","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-32/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5765","reference_id":"RHSA-2022:5765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5766","reference_id":"RHSA-2022:5766","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5766"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5767","reference_id":"RHSA-2022:5767","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5767"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5769","reference_id":"RHSA-2022:5769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5770","reference_id":"RHSA-2022:5770","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5771","reference_id":"RHSA-2022:5771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5771"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5772","reference_id":"RHSA-2022:5772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5773","reference_id":"RHSA-2022:5773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5773"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5774","reference_id":"RHSA-2022:5774","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5774"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5776","reference_id":"RHSA-2022:5776","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5776"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5777","reference_id":"RHSA-2022:5777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5778","reference_id":"RHSA-2022:5778","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5778"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1737722","reference_id":"show_bug.cgi?id=1737722","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T16:59:22Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1737722"},{"reference_url":"https://usn.ubuntu.com/5536-1/","reference_id":"USN-5536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5536-1/"},{"reference_url":"https://usn.ubuntu.com/5663-1/","reference_id":"USN-5663-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5663-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-36319"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vgqa-e7yg-wygj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31190?format=json","vulnerability_id":"VCID-vpd3-v3fr-hkdm","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28285.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-28285.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28285","reference_id":"","reference_type":"","scores":[{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48884","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48923","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48879","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48871","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48849","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48883","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48987","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48912","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50605","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50566","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50536","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50482","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50597","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50519","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072563","reference_id":"2072563","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072563"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.archlinux.org/AVG-2712","reference_id":"AVG-2712","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2712"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-14/","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-14/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-15/","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-15/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1283","reference_id":"RHSA-2022:1283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1284","reference_id":"RHSA-2022:1284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1285","reference_id":"RHSA-2022:1285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1286","reference_id":"RHSA-2022:1286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1287","reference_id":"RHSA-2022:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1301","reference_id":"RHSA-2022:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1302","reference_id":"RHSA-2022:1302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1303","reference_id":"RHSA-2022:1303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1305","reference_id":"RHSA-2022:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1326","reference_id":"RHSA-2022:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1326"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1756957","reference_id":"show_bug.cgi?id=1756957","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:03:24Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1756957"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"},{"reference_url":"https://usn.ubuntu.com/5393-1/","reference_id":"USN-5393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5393-1/"},{"reference_url":"https://usn.ubuntu.com/5494-1/","reference_id":"USN-5494-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5494-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28285"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vpd3-v3fr-hkdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31210?format=json","vulnerability_id":"VCID-vzg5-b77s-g3ft","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34478.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-34478.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34478","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34962","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35384","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35086","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35065","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34976","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34855","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34927","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34964","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34868","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34894","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35422","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3533","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35377","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35403","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35367","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35345","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34478"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102167","reference_id":"2102167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102167"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1773717","reference_id":"show_bug.cgi?id=1773717","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T18:14:23Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1773717"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34478"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vzg5-b77s-g3ft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46607?format=json","vulnerability_id":"VCID-w8br-pq5p-bydy","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28284","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58926","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5882","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58805","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58769","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58813","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58872","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58827","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58854","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58801","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5877","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58822","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58829","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58842","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58823","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58806","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-28284"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-13/","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:05:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-13/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1754522","reference_id":"show_bug.cgi?id=1754522","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-16T14:05:50Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1754522"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-28284"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w8br-pq5p-bydy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46631?format=json","vulnerability_id":"VCID-w9eu-xqcv-q3hb","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34476","reference_id":"","reference_type":"","scores":[{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69307","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69068","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.6919","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69233","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69267","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69234","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69259","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69089","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.6907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.6912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69139","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69145","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69116","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69164","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69143","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69193","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.69202","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00588","scoring_system":"epss","scoring_elements":"0.6921","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34476"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:26:43Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1387919","reference_id":"show_bug.cgi?id=1387919","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T18:26:43Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1387919"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34476"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9eu-xqcv-q3hb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46636?format=json","vulnerability_id":"VCID-wb1a-t7x7-gkcp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34485","reference_id":"","reference_type":"","scores":[{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68524","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.6844","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68476","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68468","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68308","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68352","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68378","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68365","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68372","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68411","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.68416","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00562","scoring_system":"epss","scoring_elements":"0.6842","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34485"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1768409%2C1768578","reference_id":"buglist.cgi?bug_id=1768409%2C1768578","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:34:32Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1768409%2C1768578"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:34:32Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34485"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wb1a-t7x7-gkcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31184?format=json","vulnerability_id":"VCID-wqb6-fpwk-ekgy","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26386.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26386","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2792","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28434","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28269","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28379","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28384","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2834","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28295","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28228","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.27845","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28953","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2897","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28892","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062224","reference_id":"2062224","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062224"},{"reference_url":"https://security.archlinux.org/AVG-2713","reference_id":"AVG-2713","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2713"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-11/","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:11:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-11/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-12/","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:11:42Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-12/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1752396","reference_id":"show_bug.cgi?id=1752396","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T20:11:42Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1752396"},{"reference_url":"https://usn.ubuntu.com/5345-1/","reference_id":"USN-5345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5345-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26386"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqb6-fpwk-ekgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31180?format=json","vulnerability_id":"VCID-wsdd-t7d2-gbda","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24713.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24713","reference_id":"","reference_type":"","scores":[{"value":"0.0985","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0985","scoring_system":"epss","scoring_elements":"0.92967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.93249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.93295","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.9328","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.93273","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.93272","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.93264","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.9325","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.93243","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10404","scoring_system":"epss","scoring_elements":"0.93247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10916","scoring_system":"epss","scoring_elements":"0.93415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10916","scoring_system":"epss","scoring_elements":"0.93419","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10916","scoring_system":"epss","scoring_elements":"0.93426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11247","scoring_system":"epss","scoring_elements":"0.9351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11247","scoring_system":"epss","scoring_elements":"0.93494","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11247","scoring_system":"epss","scoring_elements":"0.93502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11247","scoring_system":"epss","scoring_elements":"0.93509","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11247","scoring_system":"epss","scoring_elements":"0.93505","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rust-lang/regex","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/rust-lang/regex"},{"reference_url":"https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e"},{"reference_url":"https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8"},{"reference_url":"https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00003.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/04/msg00009.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24713","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24713"},{"reference_url":"https://rustsec.org/advisories/RUSTSEC-2022-0013.html","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rustsec.org/advisories/RUSTSEC-2022-0013.html"},{"reference_url":"https://www.debian.org/security/2022/dsa-5113","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://www.debian.org/security/2022/dsa-5113"},{"reference_url":"https://www.debian.org/security/2022/dsa-5118","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://www.debian.org/security/2022/dsa-5118"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007176","reference_id":"1007176","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007176"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072565","reference_id":"2072565","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2072565"},{"reference_url":"https://security.archlinux.org/AVG-2711","reference_id":"AVG-2711","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2711"},{"reference_url":"https://security.archlinux.org/AVG-2712","reference_id":"AVG-2712","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2712"},{"reference_url":"https://github.com/advisories/GHSA-m5pq-gvj9-9vr8","reference_id":"GHSA-m5pq-gvj9-9vr8","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-m5pq-gvj9-9vr8"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/","reference_id":"JANLZ3JXWJR7FSHE57K66UIZUIJZI67T","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JANLZ3JXWJR7FSHE57K66UIZUIJZI67T/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13","reference_id":"mfsa2022-13","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14","reference_id":"mfsa2022-14","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15","reference_id":"mfsa2022-15","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-15"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/","reference_id":"O3YB7CURSG64CIPCDPNMGPE4UU24AB6H","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3YB7CURSG64CIPCDPNMGPE4UU24AB6H/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/","reference_id":"PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:56:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PDOWTHNVGBOP2HN27PUFIGRYNSNDTYRJ/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1283","reference_id":"RHSA-2022:1283","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1283"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1284","reference_id":"RHSA-2022:1284","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1284"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1285","reference_id":"RHSA-2022:1285","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1285"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1286","reference_id":"RHSA-2022:1286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1287","reference_id":"RHSA-2022:1287","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1301","reference_id":"RHSA-2022:1301","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1301"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1302","reference_id":"RHSA-2022:1302","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1302"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1303","reference_id":"RHSA-2022:1303","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1303"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1305","reference_id":"RHSA-2022:1305","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1305"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1326","reference_id":"RHSA-2022:1326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1326"},{"reference_url":"https://usn.ubuntu.com/5370-1/","reference_id":"USN-5370-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5370-1/"},{"reference_url":"https://usn.ubuntu.com/5610-1/","reference_id":"USN-5610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5610-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-24713","GHSA-m5pq-gvj9-9vr8"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wsdd-t7d2-gbda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46635?format=json","vulnerability_id":"VCID-xpjd-99qz-vbbc","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34483","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.67046","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66905","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66947","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66986","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66958","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66981","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66833","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66896","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66916","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66903","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.669","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66924","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66935","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34483"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:43:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1335845","reference_id":"show_bug.cgi?id=1335845","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T17:43:52Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1335845"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34483"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpjd-99qz-vbbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31157?format=json","vulnerability_id":"VCID-ye9r-gnzm-sqe2","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2200.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2200.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2200","reference_id":"","reference_type":"","scores":[{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90958","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90864","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90888","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90898","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90912","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.9093","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90942","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90939","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90948","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90819","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90829","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.9084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90851","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90858","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06199","scoring_system":"epss","scoring_elements":"0.90866","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102168","reference_id":"2102168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2102168"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-25"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-25/","reference_id":"mfsa2022-25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-25/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-26/","reference_id":"mfsa2022-26","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-26/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5469","reference_id":"RHSA-2022:5469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5470","reference_id":"RHSA-2022:5470","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5470"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5472","reference_id":"RHSA-2022:5472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5473","reference_id":"RHSA-2022:5473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5474","reference_id":"RHSA-2022:5474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5474"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5475","reference_id":"RHSA-2022:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5477","reference_id":"RHSA-2022:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5477"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5478","reference_id":"RHSA-2022:5478","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5478"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5479","reference_id":"RHSA-2022:5479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5480","reference_id":"RHSA-2022:5480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5481","reference_id":"RHSA-2022:5481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5482","reference_id":"RHSA-2022:5482","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5482"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1771381","reference_id":"show_bug.cgi?id=1771381","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:02:52Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1771381"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"},{"reference_url":"https://usn.ubuntu.com/5512-1/","reference_id":"USN-5512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-2200"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ye9r-gnzm-sqe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31182?format=json","vulnerability_id":"VCID-ztmj-vavn-8kdf","summary":"Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26383.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26383.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26383","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49636","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49574","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49619","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49602","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49727","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00263","scoring_system":"epss","scoring_elements":"0.49655","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.5132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51284","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51234","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51288","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51327","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0028","scoring_system":"epss","scoring_elements":"0.51287","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062220","reference_id":"2062220","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2062220"},{"reference_url":"https://security.archlinux.org/AVG-2713","reference_id":"AVG-2713","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2713"},{"reference_url":"https://security.archlinux.org/AVG-2714","reference_id":"AVG-2714","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2714"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://security.gentoo.org/glsa/202208-14","reference_id":"GLSA-202208-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-14"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-10"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-10/","reference_id":"mfsa2022-10","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-10/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-11"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-11/","reference_id":"mfsa2022-11","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-11/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-12"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-12/","reference_id":"mfsa2022-12","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-12/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0815","reference_id":"RHSA-2022:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0815"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0816","reference_id":"RHSA-2022:0816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0817","reference_id":"RHSA-2022:0817","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0817"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0818","reference_id":"RHSA-2022:0818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0824","reference_id":"RHSA-2022:0824","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0824"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0843","reference_id":"RHSA-2022:0843","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0845","reference_id":"RHSA-2022:0845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0847","reference_id":"RHSA-2022:0847","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0847"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0850","reference_id":"RHSA-2022:0850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0853","reference_id":"RHSA-2022:0853","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0853"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1742421","reference_id":"show_bug.cgi?id=1742421","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:19:41Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1742421"},{"reference_url":"https://usn.ubuntu.com/5321-1/","reference_id":"USN-5321-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-1/"},{"reference_url":"https://usn.ubuntu.com/5321-2/","reference_id":"USN-5321-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5321-2/"},{"reference_url":"https://usn.ubuntu.com/5345-1/","reference_id":"USN-5345-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5345-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-26383"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ztmj-vavn-8kdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46615?format=json","vulnerability_id":"VCID-zudh-fjan-hqf1","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29915","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32291","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32153","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32217","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32227","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32135","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32157","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32791","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32648","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32697","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32723","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32686","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32674","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32644","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32489","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32374","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-29915"},{"reference_url":"https://security.archlinux.org/AVG-2709","reference_id":"AVG-2709","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2709"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-16"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-16/","reference_id":"mfsa2022-16","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:09:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-16/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1751678","reference_id":"show_bug.cgi?id=1751678","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:09:05Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1751678"},{"reference_url":"https://usn.ubuntu.com/5411-1/","reference_id":"USN-5411-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5411-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-29915"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zudh-fjan-hqf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46634?format=json","vulnerability_id":"VCID-zyae-qg8a-6yby","summary":"Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34482","reference_id":"","reference_type":"","scores":[{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.5989","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59734","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59782","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59843","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59799","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59826","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59749","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59785","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.5977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59807","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59814","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59797","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00386","scoring_system":"epss","scoring_elements":"0.59768","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-34482"},{"reference_url":"https://security.gentoo.org/glsa/202208-08","reference_id":"GLSA-202208-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-08"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-24/","reference_id":"mfsa2022-24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:51:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-24/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=845880","reference_id":"show_bug.cgi?id=845880","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T17:51:21Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=845880"},{"reference_url":"https://usn.ubuntu.com/5504-1/","reference_id":"USN-5504-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5504-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/76831?format=json","purl":"pkg:ebuild/www-client/firefox@91.12.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"},{"url":"http://public2.vulnerablecode.io/api/packages/76832?format=json","purl":"pkg:ebuild/www-client/firefox@103.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@103.0"}],"aliases":["CVE-2022-34482"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zyae-qg8a-6yby"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@91.12.0"}