{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","type":"ebuild","namespace":"mail-client","name":"thunderbird","version":"115.7.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"115.10.0","latest_non_vulnerable_version":"128.9.0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51404?format=json","vulnerability_id":"VCID-19r2-4svk-uydr","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4578.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4578","reference_id":"","reference_type":"","scores":[{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28792","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28791","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28871","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28853","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28891","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28937","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.2881","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.28904","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35783","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35742","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35815","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35823","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.3576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.358","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00151","scoring_system":"epss","scoring_elements":"0.35789","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4578"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236077","reference_id":"2236077","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236077"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839007","reference_id":"show_bug.cgi?id=1839007","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:09Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839007"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4578"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-19r2-4svk-uydr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51411?format=json","vulnerability_id":"VCID-1dkk-86db-s3ch","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5168.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5168","reference_id":"","reference_type":"","scores":[{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49049","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49056","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49052","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49006","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4897","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48889","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48952","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48979","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48926","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48955","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.4903","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.48965","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00256","scoring_system":"epss","scoring_elements":"0.49005","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5168"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240892","reference_id":"2240892","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240892"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-42/","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-42/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-43/","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-43/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846683","reference_id":"show_bug.cgi?id=1846683","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:10Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846683"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5168"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1dkk-86db-s3ch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51384?format=json","vulnerability_id":"VCID-1h5k-e7nm-uyc9","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3417.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3417","reference_id":"","reference_type":"","scores":[{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36949","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36975","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3701","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37001","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3711","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43305","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43367","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43291","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.4316","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43235","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43252","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43191","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43222","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43285","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43497","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0021","scoring_system":"epss","scoring_elements":"0.43363","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225325","reference_id":"2225325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2225325"},{"reference_url":"https://www.debian.org/security/2023/dsa-5463","reference_id":"dsa-5463","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/"}],"url":"https://www.debian.org/security/2023/dsa-5463"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-27","reference_id":"mfsa2023-27","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-27"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-27/","reference_id":"mfsa2023-27","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-27/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-28","reference_id":"mfsa2023-28","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-28"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-28/","reference_id":"mfsa2023-28","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-28/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00032.html","reference_id":"msg00032.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00032.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1835582","reference_id":"show_bug.cgi?id=1835582","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-25T18:54:00Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1835582"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-3417"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1h5k-e7nm-uyc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51396?format=json","vulnerability_id":"VCID-32pc-j3he-pffx","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4055","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57444","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57416","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57395","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57375","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57331","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57354","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57282","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57326","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.5739","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57339","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57364","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.5743","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57348","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57347","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57401","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228367","reference_id":"2228367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228367"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1782561","reference_id":"show_bug.cgi?id=1782561","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:30:02Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1782561"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4055"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-32pc-j3he-pffx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51421?format=json","vulnerability_id":"VCID-4f4y-p7h8-dygq","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5728.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5728.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5728","reference_id":"","reference_type":"","scores":[{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66986","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67158","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67146","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67083","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67061","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67089","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.6705","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67008","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67037","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67004","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67018","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245903","reference_id":"2245903","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245903"},{"reference_url":"https://www.debian.org/security/2023/dsa-5535","reference_id":"dsa-5535","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5535"},{"reference_url":"https://www.debian.org/security/2023/dsa-5538","reference_id":"dsa-5538","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://www.debian.org/security/2023/dsa-5538"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6162","reference_id":"RHSA-2023:6162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6185","reference_id":"RHSA-2023:6185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6186","reference_id":"RHSA-2023:6186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6187","reference_id":"RHSA-2023:6187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6188","reference_id":"RHSA-2023:6188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6189","reference_id":"RHSA-2023:6189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6191","reference_id":"RHSA-2023:6191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6194","reference_id":"RHSA-2023:6194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6195","reference_id":"RHSA-2023:6195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6196","reference_id":"RHSA-2023:6196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6197","reference_id":"RHSA-2023:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6198","reference_id":"RHSA-2023:6198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6199","reference_id":"RHSA-2023:6199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6199"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1852729","reference_id":"show_bug.cgi?id=1852729","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:34:03Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1852729"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"},{"reference_url":"https://usn.ubuntu.com/6468-1/","reference_id":"USN-6468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6468-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5728"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4f4y-p7h8-dygq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51443?format=json","vulnerability_id":"VCID-52ha-qvpu-ruc8","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37208","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13876","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.15001","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14657","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14785","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14873","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14865","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14909","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14988","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219750","reference_id":"2219750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219750"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837675","reference_id":"show_bug.cgi?id=1837675","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837675"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-37208"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-qvpu-ruc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51437?format=json","vulnerability_id":"VCID-5qf5-d44c-t7gu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6862.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6862","reference_id":"","reference_type":"","scores":[{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.5868","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58682","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58636","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00367","scoring_system":"epss","scoring_elements":"0.58606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63411","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63264","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63283","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63297","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63295","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63307","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63359","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63319","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63346","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63401","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255368","reference_id":"2255368","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255368"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.debian.org/security/2023/dsa-5582","reference_id":"dsa-5582","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.debian.org/security/2023/dsa-5582"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1868042","reference_id":"show_bug.cgi?id=1868042","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-12T20:20:08Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1868042"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6862"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5qf5-d44c-t7gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51410?format=json","vulnerability_id":"VCID-6s88-vfr8-u3hj","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4585.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4585","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41078","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41107","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41081","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41096","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41089","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.41113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.4104","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42215","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42329","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42326","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42242","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42098","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42173","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4219","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42133","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42204","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4585"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236086","reference_id":"2236086","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236086"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999","reference_id":"buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1751583%2C1841082%2C1847904%2C1848999"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T19:08:38Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4585"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6s88-vfr8-u3hj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51388?format=json","vulnerability_id":"VCID-6tm9-1vsh-1qa3","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4047.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4047","reference_id":"","reference_type":"","scores":[{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66804","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66851","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.6683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66816","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66767","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69143","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.68966","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69031","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69012","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69055","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69088","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.6908","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00582","scoring_system":"epss","scoring_elements":"0.69131","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228362","reference_id":"2228362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228362"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839073","reference_id":"show_bug.cgi?id=1839073","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-22T15:16:57Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839073"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4047"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6tm9-1vsh-1qa3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51414?format=json","vulnerability_id":"VCID-6zjy-1agk-nbd9","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5174","reference_id":"","reference_type":"","scores":[{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63599","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63466","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63452","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63469","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6345","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63494","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63547","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63512","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63539","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6359","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6339","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63459","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.6346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63458","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5174"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240895","reference_id":"2240895","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240895"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-42/","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-42/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-43/","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-43/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1848454","reference_id":"show_bug.cgi?id=1848454","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1848454"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5174"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6zjy-1agk-nbd9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51399?format=json","vulnerability_id":"VCID-75sb-xb3r-3fa8","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4573.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4573","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33146","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33119","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33251","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33208","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33168","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.331","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33293","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40765","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236071","reference_id":"2236071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236071"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-35/","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-37/","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846687","reference_id":"show_bug.cgi?id=1846687","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:08:18Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846687"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6368-1/","reference_id":"USN-6368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6368-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4573"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75sb-xb3r-3fa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51398?format=json","vulnerability_id":"VCID-7sbd-1n7f-ryed","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4057.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4057","reference_id":"","reference_type":"","scores":[{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43821","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43791","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43883","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43865","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44044","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43914","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43918","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43851","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43936","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4461","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44609","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.4463","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44639","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44665","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0022","scoring_system":"epss","scoring_elements":"0.44658","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4057"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228371","reference_id":"2228371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228371"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-33/","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-33/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1841682","reference_id":"show_bug.cgi?id=1841682","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:20:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1841682"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4057"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7sbd-1n7f-ryed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44362?format=json","vulnerability_id":"VCID-7x5h-kej1-e3ef","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0751","reference_id":"","reference_type":"","scores":[{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63359","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63352","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63317","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.6337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63291","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00443","scoring_system":"epss","scoring_elements":"0.63319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66087","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65942","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65955","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65966","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65987","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66032","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66001","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66022","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66078","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259932","reference_id":"2259932","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259932"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1865689","reference_id":"show_bug.cgi?id=1865689","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:16Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1865689"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0751"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7x5h-kej1-e3ef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51390?format=json","vulnerability_id":"VCID-878b-mn4w-wkg4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4049.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4049","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43947","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43825","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43758","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43729","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43843","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43791","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43774","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43698","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43819","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43899","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43903","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52895","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.5285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52939","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52923","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52907","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52944","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52951","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228364","reference_id":"2228364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228364"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842658","reference_id":"show_bug.cgi?id=1842658","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:10:50Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842658"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4049"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-878b-mn4w-wkg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51425?format=json","vulnerability_id":"VCID-87mf-fznn-m3gy","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6205","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61762","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61649","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61657","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61651","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61597","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61647","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61706","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61666","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61695","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61747","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61564","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61637","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61664","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250897","reference_id":"2250897","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250897"},{"reference_url":"https://www.debian.org/security/2023/dsa-5561","reference_id":"dsa-5561","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.debian.org/security/2023/dsa-5561"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-49/","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-49/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-50/","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-50/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-52/","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-52/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1854076","reference_id":"show_bug.cgi?id=1854076","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-25T19:19:02Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1854076"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6205"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-87mf-fznn-m3gy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51389?format=json","vulnerability_id":"VCID-8dgu-ppan-9ub2","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4048.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4048","reference_id":"","reference_type":"","scores":[{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54021","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5407","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53974","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54083","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.54015","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.5396","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53917","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53969","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53987","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00308","scoring_system":"epss","scoring_elements":"0.53999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64051","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.6404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64067","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64079","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64065","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64036","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.6407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00459","scoring_system":"epss","scoring_elements":"0.64082","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228363","reference_id":"2228363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228363"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1841368","reference_id":"show_bug.cgi?id=1841368","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:12:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1841368"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4048"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8dgu-ppan-9ub2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51413?format=json","vulnerability_id":"VCID-8fny-dsut-7ba3","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5171.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5171","reference_id":"","reference_type":"","scores":[{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49432","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49398","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49441","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49412","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49282","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49342","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49367","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49316","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49343","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49374","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49401","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49355","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4941","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49423","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240894","reference_id":"2240894","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240894"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","reference_id":"AY642Z6JZODQJE7Z62CFREVUHEGCXGPD","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5506","reference_id":"dsa-5506","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://www.debian.org/security/2023/dsa-5506"},{"reference_url":"https://www.debian.org/security/2023/dsa-5513","reference_id":"dsa-5513","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://www.debian.org/security/2023/dsa-5513"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-42/","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-42/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-43/","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-43/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5426","reference_id":"RHSA-2023:5426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5427","reference_id":"RHSA-2023:5427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5428","reference_id":"RHSA-2023:5428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5429","reference_id":"RHSA-2023:5429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5430","reference_id":"RHSA-2023:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5432","reference_id":"RHSA-2023:5432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5433","reference_id":"RHSA-2023:5433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5434","reference_id":"RHSA-2023:5434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5435","reference_id":"RHSA-2023:5435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5436","reference_id":"RHSA-2023:5436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5437","reference_id":"RHSA-2023:5437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5438","reference_id":"RHSA-2023:5438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5439","reference_id":"RHSA-2023:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5440","reference_id":"RHSA-2023:5440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5475","reference_id":"RHSA-2023:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5477","reference_id":"RHSA-2023:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5477"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1851599","reference_id":"show_bug.cgi?id=1851599","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:24:47Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1851599"},{"reference_url":"https://usn.ubuntu.com/6404-1/","reference_id":"USN-6404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6404-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5171"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8fny-dsut-7ba3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51422?format=json","vulnerability_id":"VCID-8m89-ma2u-5fgu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5730.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5730.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5730","reference_id":"","reference_type":"","scores":[{"value":"0.00444","scoring_system":"epss","scoring_elements":"0.6341","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00444","scoring_system":"epss","scoring_elements":"0.63392","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65724","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.6557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65542","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65578","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.6559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65602","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65599","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65576","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65623","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65668","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65639","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65658","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65715","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65535","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.655","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65564","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00489","scoring_system":"epss","scoring_elements":"0.65583","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245906","reference_id":"2245906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245906"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695","reference_id":"buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836607%2C1840918%2C1848694%2C1848833%2C1850191%2C1850259%2C1852596%2C1853201%2C1854002%2C1855306%2C1855640%2C1856695"},{"reference_url":"https://www.debian.org/security/2023/dsa-5535","reference_id":"dsa-5535","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://www.debian.org/security/2023/dsa-5535"},{"reference_url":"https://www.debian.org/security/2023/dsa-5538","reference_id":"dsa-5538","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://www.debian.org/security/2023/dsa-5538"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-11T18:25:19Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6162","reference_id":"RHSA-2023:6162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6185","reference_id":"RHSA-2023:6185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6186","reference_id":"RHSA-2023:6186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6187","reference_id":"RHSA-2023:6187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6188","reference_id":"RHSA-2023:6188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6189","reference_id":"RHSA-2023:6189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6191","reference_id":"RHSA-2023:6191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6194","reference_id":"RHSA-2023:6194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6195","reference_id":"RHSA-2023:6195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6196","reference_id":"RHSA-2023:6196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6197","reference_id":"RHSA-2023:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6198","reference_id":"RHSA-2023:6198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6199","reference_id":"RHSA-2023:6199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6199"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"},{"reference_url":"https://usn.ubuntu.com/6468-1/","reference_id":"USN-6468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6468-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5730"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8m89-ma2u-5fgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51405?format=json","vulnerability_id":"VCID-9dpt-xfu6-cuh5","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4580.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4580","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21063","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20976","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21138","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21165","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21043","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21011","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21058","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21157","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24011","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24142","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23989","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24036","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.24053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23964","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00082","scoring_system":"epss","scoring_elements":"0.23952","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4580"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236079","reference_id":"2236079","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236079"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1843046","reference_id":"show_bug.cgi?id=1843046","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:01:48Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1843046"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4580"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dpt-xfu6-cuh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51434?format=json","vulnerability_id":"VCID-9z3s-qfbc-vbdc","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6859","reference_id":"","reference_type":"","scores":[{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59175","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00375","scoring_system":"epss","scoring_elements":"0.59159","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61515","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61564","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61623","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61584","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6168","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61613","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61666","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.6157","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61565","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63654","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63609","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63573","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63625","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63608","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63645","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255364","reference_id":"2255364","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255364"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6859"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9z3s-qfbc-vbdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44434?format=json","vulnerability_id":"VCID-apes-5sa9-w7gd","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0755.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0755","reference_id":"","reference_type":"","scores":[{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70909","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70898","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70845","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70817","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70851","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70814","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70774","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.7079","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70791","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00646","scoring_system":"epss","scoring_elements":"0.70781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73233","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73239","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.7326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.7328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73324","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00757","scoring_system":"epss","scoring_elements":"0.73333","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0755"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259934","reference_id":"2259934","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259934"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701","reference_id":"buglist.cgi?bug_id=1868456%2C1871445%2C1873701","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1868456%2C1871445%2C1873701"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0755"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apes-5sa9-w7gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51401?format=json","vulnerability_id":"VCID-bapg-hzuc-ykby","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4575.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4575.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4575","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33146","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33119","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33251","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33208","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33168","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.331","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33293","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40777","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40729","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40779","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40805","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40771","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40752","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40796","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40765","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236073","reference_id":"2236073","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236073"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-35/","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-37/","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846689","reference_id":"show_bug.cgi?id=1846689","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:05:40Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846689"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6368-1/","reference_id":"USN-6368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6368-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4575"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bapg-hzuc-ykby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51435?format=json","vulnerability_id":"VCID-bw96-5g6y-j3c4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6860.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6860","reference_id":"","reference_type":"","scores":[{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62919","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62986","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62892","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62975","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62881","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62834","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.6288","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00434","scoring_system":"epss","scoring_elements":"0.62933","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63657","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64648","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64584","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64571","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64636","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.6464","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64612","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00471","scoring_system":"epss","scoring_elements":"0.64659","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255365","reference_id":"2255365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255365"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6860"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bw96-5g6y-j3c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51402?format=json","vulnerability_id":"VCID-cfqv-7r6b-g3e9","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4576.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4576","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55573","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55539","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55463","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55483","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55457","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55407","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55453","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5551","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55469","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55557","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55497","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55521","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55549","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55559","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55538","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4576"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236074","reference_id":"2236074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236074"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-35/","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-37/","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846694","reference_id":"show_bug.cgi?id=1846694","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-26T14:57:46Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846694"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4576"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfqv-7r6b-g3e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51441?format=json","vulnerability_id":"VCID-ch3v-nq5w-3fg4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37202","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71009","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70981","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71015","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71063","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.71073","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00651","scoring_system":"epss","scoring_elements":"0.70939","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71192","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71228","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219748","reference_id":"2219748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219748"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1834711","reference_id":"show_bug.cgi?id=1834711","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1834711"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"},{"reference_url":"https://usn.ubuntu.com/6227-1/","reference_id":"USN-6227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-37202"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ch3v-nq5w-3fg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51400?format=json","vulnerability_id":"VCID-cj16-a2tv-cqd7","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4574.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4574.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4574","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33225","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33146","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33119","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33251","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33208","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33168","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.331","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33312","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33293","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34839","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34766","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3481","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34844","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34806","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34782","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34819","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34803","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236072","reference_id":"2236072","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236072"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-35/","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-37/","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846688","reference_id":"show_bug.cgi?id=1846688","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T15:07:09Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846688"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6368-1/","reference_id":"USN-6368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6368-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4574"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cj16-a2tv-cqd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51426?format=json","vulnerability_id":"VCID-e6bs-vk6j-h3e6","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6206","reference_id":"","reference_type":"","scores":[{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62585","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62496","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62521","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62574","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62387","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62449","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62468","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62458","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62435","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62485","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62495","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62492","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62438","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62486","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00428","scoring_system":"epss","scoring_elements":"0.62543","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250898","reference_id":"2250898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250898"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6bs-vk6j-h3e6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51438?format=json","vulnerability_id":"VCID-f6qv-znt2-2bd5","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6863.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6863","reference_id":"","reference_type":"","scores":[{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64461","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6437","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.6439","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64403","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64377","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64422","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64467","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64437","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64514","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00464","scoring_system":"epss","scoring_elements":"0.64522","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66214","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66146","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66141","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66189","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66203","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66178","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00504","scoring_system":"epss","scoring_elements":"0.66228","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255369","reference_id":"2255369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255369"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6863"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f6qv-znt2-2bd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51424?format=json","vulnerability_id":"VCID-fwr3-cgq1-a3b4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6204","reference_id":"","reference_type":"","scores":[{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.4993","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50038","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50067","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50071","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50064","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50082","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50054","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.5005","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50095","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50059","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00266","scoring_system":"epss","scoring_elements":"0.50055","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56676","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56575","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56599","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5666","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56561","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56625","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250896","reference_id":"2250896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250896"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fwr3-cgq1-a3b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51423?format=json","vulnerability_id":"VCID-g5z1-9an3-aubs","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5732.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5732.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5732","reference_id":"","reference_type":"","scores":[{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52435","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52356","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52444","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52332","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5237","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52326","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52361","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54974","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54992","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55004","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.54963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00319","scoring_system":"epss","scoring_elements":"0.55001","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245898","reference_id":"2245898","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245898"},{"reference_url":"https://www.debian.org/security/2023/dsa-5535","reference_id":"dsa-5535","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://www.debian.org/security/2023/dsa-5535"},{"reference_url":"https://www.debian.org/security/2023/dsa-5538","reference_id":"dsa-5538","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://www.debian.org/security/2023/dsa-5538"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6162","reference_id":"RHSA-2023:6162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6185","reference_id":"RHSA-2023:6185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6186","reference_id":"RHSA-2023:6186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6187","reference_id":"RHSA-2023:6187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6188","reference_id":"RHSA-2023:6188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6189","reference_id":"RHSA-2023:6189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6191","reference_id":"RHSA-2023:6191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6194","reference_id":"RHSA-2023:6194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6195","reference_id":"RHSA-2023:6195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6196","reference_id":"RHSA-2023:6196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6197","reference_id":"RHSA-2023:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6198","reference_id":"RHSA-2023:6198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6199","reference_id":"RHSA-2023:6199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6199"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1690979","reference_id":"show_bug.cgi?id=1690979","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1690979"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1836962","reference_id":"show_bug.cgi?id=1836962","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:24:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1836962"},{"reference_url":"https://usn.ubuntu.com/6468-1/","reference_id":"USN-6468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6468-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5732"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g5z1-9an3-aubs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51440?format=json","vulnerability_id":"VCID-gs3s-s4zk-fyh4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37201","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72333","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73291","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00758","scoring_system":"epss","scoring_elements":"0.73474","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00758","scoring_system":"epss","scoring_elements":"0.73377","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00758","scoring_system":"epss","scoring_elements":"0.73403","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00758","scoring_system":"epss","scoring_elements":"0.73427","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00758","scoring_system":"epss","scoring_elements":"0.73386","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00758","scoring_system":"epss","scoring_elements":"0.7341","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00758","scoring_system":"epss","scoring_elements":"0.73467","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219747","reference_id":"2219747","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219747"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826002","reference_id":"show_bug.cgi?id=1826002","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826002"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-37201"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs3s-s4zk-fyh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51409?format=json","vulnerability_id":"VCID-j1yh-f1np-wbcv","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4584.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4584.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4584","reference_id":"","reference_type":"","scores":[{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.5101","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.51004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50966","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50982","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50907","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50964","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.51003","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52658","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52536","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52582","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52544","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52571","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52648","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52618","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52568","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00292","scoring_system":"epss","scoring_elements":"0.52483","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4584"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236084","reference_id":"2236084","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236084"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6368-1/","reference_id":"USN-6368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6368-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4584"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j1yh-f1np-wbcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51393?format=json","vulnerability_id":"VCID-j2ax-jb2h-byeu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4052","reference_id":"","reference_type":"","scores":[{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39075","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39099","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.38972","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39043","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3906","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3897","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.38992","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39066","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39515","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.395","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.3951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39455","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39506","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39393","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00179","scoring_system":"epss","scoring_elements":"0.39181","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4052"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228369","reference_id":"2228369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228369"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-33/","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-33/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1824420","reference_id":"show_bug.cgi?id=1824420","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:38:55Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1824420"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4052"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j2ax-jb2h-byeu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51446?format=json","vulnerability_id":"VCID-j45f-m9q5-vfah","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50762.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50762.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50762","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.4015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40104","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52345","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52354","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52183","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52234","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52278","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.5224","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52264","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255379","reference_id":"2255379","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255379"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-50762"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j45f-m9q5-vfah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51412?format=json","vulnerability_id":"VCID-jzte-jqk6-7ya6","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5169","reference_id":"","reference_type":"","scores":[{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47081","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47073","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47129","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47125","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47018","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46935","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46999","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46962","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.46994","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47064","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.4705","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47069","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47016","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47071","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0024","scoring_system":"epss","scoring_elements":"0.47068","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240893","reference_id":"2240893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240893"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/","reference_id":"AY642Z6JZODQJE7Z62CFREVUHEGCXGPD","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5506","reference_id":"dsa-5506","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://www.debian.org/security/2023/dsa-5506"},{"reference_url":"https://www.debian.org/security/2023/dsa-5513","reference_id":"dsa-5513","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://www.debian.org/security/2023/dsa-5513"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-42/","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-42/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-43/","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-43/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5426","reference_id":"RHSA-2023:5426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5427","reference_id":"RHSA-2023:5427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5428","reference_id":"RHSA-2023:5428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5429","reference_id":"RHSA-2023:5429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5430","reference_id":"RHSA-2023:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5432","reference_id":"RHSA-2023:5432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5433","reference_id":"RHSA-2023:5433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5434","reference_id":"RHSA-2023:5434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5435","reference_id":"RHSA-2023:5435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5436","reference_id":"RHSA-2023:5436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5437","reference_id":"RHSA-2023:5437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5438","reference_id":"RHSA-2023:5438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5439","reference_id":"RHSA-2023:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5440","reference_id":"RHSA-2023:5440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5475","reference_id":"RHSA-2023:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5477","reference_id":"RHSA-2023:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5477"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846685","reference_id":"show_bug.cgi?id=1846685","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-23T19:25:15Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846685"},{"reference_url":"https://usn.ubuntu.com/6404-1/","reference_id":"USN-6404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6404-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5169"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jzte-jqk6-7ya6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51432?format=json","vulnerability_id":"VCID-kskc-agaw-8bcr","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6857.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6857","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40745","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40775","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40783","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4073","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40749","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45406","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.4529","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45313","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45389","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45418","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45428","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45367","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45328","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00227","scoring_system":"epss","scoring_elements":"0.45345","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255362","reference_id":"2255362","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255362"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6857"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kskc-agaw-8bcr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51391?format=json","vulnerability_id":"VCID-m2sr-re2h-3baq","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4050.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4050","reference_id":"","reference_type":"","scores":[{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87543","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87508","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87495","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87551","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.875","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87483","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87469","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03401","scoring_system":"epss","scoring_elements":"0.87455","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89218","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89267","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89263","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.8926","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04614","scoring_system":"epss","scoring_elements":"0.89273","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228365","reference_id":"2228365","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228365"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1843038","reference_id":"show_bug.cgi?id=1843038","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:46:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1843038"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4050"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2sr-re2h-3baq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51416?format=json","vulnerability_id":"VCID-mh92-65bz-43ds","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5721.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5721","reference_id":"","reference_type":"","scores":[{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54139","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54039","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5405","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54089","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54094","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54026","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53975","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54017","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54072","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.5403","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54056","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54127","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.54012","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00309","scoring_system":"epss","scoring_elements":"0.53988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56011","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56086","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245896","reference_id":"2245896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245896"},{"reference_url":"https://www.debian.org/security/2023/dsa-5535","reference_id":"dsa-5535","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://www.debian.org/security/2023/dsa-5535"},{"reference_url":"https://www.debian.org/security/2023/dsa-5538","reference_id":"dsa-5538","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://www.debian.org/security/2023/dsa-5538"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6162","reference_id":"RHSA-2023:6162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6185","reference_id":"RHSA-2023:6185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6186","reference_id":"RHSA-2023:6186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6187","reference_id":"RHSA-2023:6187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6188","reference_id":"RHSA-2023:6188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6189","reference_id":"RHSA-2023:6189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6191","reference_id":"RHSA-2023:6191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6194","reference_id":"RHSA-2023:6194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6195","reference_id":"RHSA-2023:6195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6196","reference_id":"RHSA-2023:6196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6197","reference_id":"RHSA-2023:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6198","reference_id":"RHSA-2023:6198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6199","reference_id":"RHSA-2023:6199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6199"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1830820","reference_id":"show_bug.cgi?id=1830820","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:57:20Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1830820"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"},{"reference_url":"https://usn.ubuntu.com/6468-1/","reference_id":"USN-6468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6468-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5721"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mh92-65bz-43ds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51417?format=json","vulnerability_id":"VCID-mj7n-8hf6-2qar","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5724.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5724","reference_id":"","reference_type":"","scores":[{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69645","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69697","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74673","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74655","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74688","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74663","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74633","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74631","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74629","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.7454","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74734","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74728","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74556","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74596","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74588","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74551","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74578","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245899","reference_id":"2245899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245899"},{"reference_url":"https://www.debian.org/security/2023/dsa-5535","reference_id":"dsa-5535","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://www.debian.org/security/2023/dsa-5535"},{"reference_url":"https://www.debian.org/security/2023/dsa-5538","reference_id":"dsa-5538","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://www.debian.org/security/2023/dsa-5538"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6162","reference_id":"RHSA-2023:6162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6185","reference_id":"RHSA-2023:6185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6186","reference_id":"RHSA-2023:6186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6187","reference_id":"RHSA-2023:6187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6188","reference_id":"RHSA-2023:6188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6189","reference_id":"RHSA-2023:6189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6191","reference_id":"RHSA-2023:6191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6194","reference_id":"RHSA-2023:6194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6195","reference_id":"RHSA-2023:6195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6196","reference_id":"RHSA-2023:6196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6197","reference_id":"RHSA-2023:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6198","reference_id":"RHSA-2023:6198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6199","reference_id":"RHSA-2023:6199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6199"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1836705","reference_id":"show_bug.cgi?id=1836705","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:56:11Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1836705"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"},{"reference_url":"https://usn.ubuntu.com/6468-1/","reference_id":"USN-6468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6468-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5724"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mj7n-8hf6-2qar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51442?format=json","vulnerability_id":"VCID-mwj3-wa1g-buay","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37207","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61571","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61845","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61817","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61863","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61799","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61899","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61913","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61752","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66078","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66093","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219749","reference_id":"2219749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219749"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1816287","reference_id":"show_bug.cgi?id=1816287","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1816287"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-37207"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwj3-wa1g-buay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51445?format=json","vulnerability_id":"VCID-nq6f-ezcx-mfas","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50761.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-50761.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50761","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40137","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40085","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.4015","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40123","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40104","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40154","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52345","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52354","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52266","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52273","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52183","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52234","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52278","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.5224","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00288","scoring_system":"epss","scoring_elements":"0.52264","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255378","reference_id":"2255378","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255378"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-50761"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nq6f-ezcx-mfas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51439?format=json","vulnerability_id":"VCID-pepm-1t68-uuf1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6864.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6864","reference_id":"","reference_type":"","scores":[{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65706","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65732","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65707","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65755","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.658","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65771","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65855","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65789","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00493","scoring_system":"epss","scoring_elements":"0.65845","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69219","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69151","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69132","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69182","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.6918","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0059","scoring_system":"epss","scoring_elements":"0.69228","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255370","reference_id":"2255370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255370"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6864"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pepm-1t68-uuf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51403?format=json","vulnerability_id":"VCID-pv9q-fcta-ffbq","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4577.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4577","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27586","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27644","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27473","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27534","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27556","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27477","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27492","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27569","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28118","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28067","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28073","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2783","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27718","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4577"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236075","reference_id":"2236075","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236075"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1847397","reference_id":"show_bug.cgi?id=1847397","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-19T20:02:33Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1847397"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4577"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pv9q-fcta-ffbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44181?format=json","vulnerability_id":"VCID-pvvt-h3mh-33eb","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0741.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0741","reference_id":"","reference_type":"","scores":[{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97727","published_at":"2026-05-15T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97724","published_at":"2026-05-14T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97717","published_at":"2026-05-12T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97713","published_at":"2026-05-11T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97711","published_at":"2026-05-07T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97709","published_at":"2026-05-05T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97705","published_at":"2026-04-29T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.47284","scoring_system":"epss","scoring_elements":"0.97698","published_at":"2026-04-24T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97757","published_at":"2026-04-04T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97759","published_at":"2026-04-07T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97764","published_at":"2026-04-08T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97767","published_at":"2026-04-09T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.9777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97772","published_at":"2026-04-12T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97774","published_at":"2026-04-13T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.9778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.49052","scoring_system":"epss","scoring_elements":"0.97782","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259926","reference_id":"2259926","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259926"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1864587","reference_id":"show_bug.cgi?id=1864587","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1864587"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0741"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pvvt-h3mh-33eb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51429?format=json","vulnerability_id":"VCID-pybb-2ny2-quas","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6209.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6209","reference_id":"","reference_type":"","scores":[{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59466","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59356","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59384","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59456","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59284","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59348","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59367","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5935","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59365","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59371","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59352","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5933","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59292","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59341","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59398","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250901","reference_id":"2250901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250901"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6209"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pybb-2ny2-quas"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51431?format=json","vulnerability_id":"VCID-qdqj-rhcr-wbca","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6856","reference_id":"","reference_type":"","scores":[{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93268","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.9327","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93266","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93272","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93286","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93296","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93318","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93303","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10471","scoring_system":"epss","scoring_elements":"0.93325","published_at":"2026-05-15T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93446","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93397","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93413","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93421","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93422","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10986","scoring_system":"epss","scoring_elements":"0.93441","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255360","reference_id":"2255360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255360"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6856"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdqj-rhcr-wbca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51415?format=json","vulnerability_id":"VCID-rbna-kkn2-2baj","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5176","reference_id":"","reference_type":"","scores":[{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.7227","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72263","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72205","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72177","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72215","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.7208","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72092","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72187","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72158","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72166","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72172","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72119","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72134","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72126","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72085","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.721","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00704","scoring_system":"epss","scoring_elements":"0.72067","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240896","reference_id":"2240896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240896"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195","reference_id":"buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195"},{"reference_url":"https://www.debian.org/security/2023/dsa-5506","reference_id":"dsa-5506","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/"}],"url":"https://www.debian.org/security/2023/dsa-5506"},{"reference_url":"https://www.debian.org/security/2023/dsa-5513","reference_id":"dsa-5513","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/"}],"url":"https://www.debian.org/security/2023/dsa-5513"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-41/","reference_id":"mfsa2023-41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-42"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-42/","reference_id":"mfsa2023-42","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-42/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-43/","reference_id":"mfsa2023-43","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-43/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html","reference_id":"msg00034.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:06Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00034.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5426","reference_id":"RHSA-2023:5426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5427","reference_id":"RHSA-2023:5427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5428","reference_id":"RHSA-2023:5428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5429","reference_id":"RHSA-2023:5429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5430","reference_id":"RHSA-2023:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5432","reference_id":"RHSA-2023:5432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5433","reference_id":"RHSA-2023:5433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5434","reference_id":"RHSA-2023:5434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5435","reference_id":"RHSA-2023:5435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5436","reference_id":"RHSA-2023:5436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5437","reference_id":"RHSA-2023:5437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5438","reference_id":"RHSA-2023:5438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5439","reference_id":"RHSA-2023:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5440","reference_id":"RHSA-2023:5440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5475","reference_id":"RHSA-2023:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5477","reference_id":"RHSA-2023:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5477"},{"reference_url":"https://usn.ubuntu.com/6404-1/","reference_id":"USN-6404-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6404-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5176"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rbna-kkn2-2baj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51385?format=json","vulnerability_id":"VCID-s3vw-7gyn-ubdt","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3600.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3600","reference_id":"","reference_type":"","scores":[{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38905","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38833","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39276","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39041","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3906","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39776","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39854","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39832","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39819","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39802","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39852","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40529","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40511","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40441","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0019","scoring_system":"epss","scoring_elements":"0.40515","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-3600"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222652","reference_id":"2222652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222652"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-26","reference_id":"mfsa2023-26","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-26"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-26/","reference_id":"mfsa2023-26","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-26/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-27","reference_id":"mfsa2023-27","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-27"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-27/","reference_id":"mfsa2023-27","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-27/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5426","reference_id":"RHSA-2023:5426","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5426"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5427","reference_id":"RHSA-2023:5427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5427"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5428","reference_id":"RHSA-2023:5428","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5428"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5429","reference_id":"RHSA-2023:5429","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5429"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5430","reference_id":"RHSA-2023:5430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5432","reference_id":"RHSA-2023:5432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5433","reference_id":"RHSA-2023:5433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5434","reference_id":"RHSA-2023:5434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5435","reference_id":"RHSA-2023:5435","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5435"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5436","reference_id":"RHSA-2023:5436","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5436"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5437","reference_id":"RHSA-2023:5437","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5437"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5438","reference_id":"RHSA-2023:5438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5438"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5439","reference_id":"RHSA-2023:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5439"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5440","reference_id":"RHSA-2023:5440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5475","reference_id":"RHSA-2023:5475","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5475"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5477","reference_id":"RHSA-2023:5477","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5477"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839703","reference_id":"show_bug.cgi?id=1839703","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-07T16:47:10Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839703"},{"reference_url":"https://usn.ubuntu.com/6218-1/","reference_id":"USN-6218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6218-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-3600"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s3vw-7gyn-ubdt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51406?format=json","vulnerability_id":"VCID-sfyj-m6xa-8bbc","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4581.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4581.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4581","reference_id":"","reference_type":"","scores":[{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36501","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36427","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36405","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36844","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3652","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.3649","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36463","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36391","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36506","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0016","scoring_system":"epss","scoring_elements":"0.36594","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38124","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38173","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38196","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38066","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38116","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38142","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38082","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38128","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38108","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236080","reference_id":"2236080","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236080"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-35/","reference_id":"mfsa2023-35","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-37/","reference_id":"mfsa2023-37","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1843758","reference_id":"show_bug.cgi?id=1843758","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T16:02:47Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1843758"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6368-1/","reference_id":"USN-6368-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6368-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4581"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sfyj-m6xa-8bbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51386?format=json","vulnerability_id":"VCID-sh7r-dftz-kyhn","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4045.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4045","reference_id":"","reference_type":"","scores":[{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46466","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46374","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46341","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46397","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46377","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46445","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46406","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00235","scoring_system":"epss","scoring_elements":"0.46459","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55474","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55471","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55526","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55538","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228360","reference_id":"2228360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228360"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1833876","reference_id":"show_bug.cgi?id=1833876","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:29:47Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1833876"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4045"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sh7r-dftz-kyhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51407?format=json","vulnerability_id":"VCID-snbc-j4e3-uff1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4582.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4582","reference_id":"","reference_type":"","scores":[{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66285","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66275","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.6616","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66138","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66218","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66197","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66225","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00503","scoring_system":"epss","scoring_elements":"0.66182","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00657","scoring_system":"epss","scoring_elements":"0.71103","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00718","scoring_system":"epss","scoring_elements":"0.72395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.73966","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74036","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74018","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.7405","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00798","scoring_system":"epss","scoring_elements":"0.74051","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4582"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236081","reference_id":"2236081","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236081"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1773874","reference_id":"show_bug.cgi?id=1773874","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-19T20:00:26Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1773874"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4582"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-snbc-j4e3-uff1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44270?format=json","vulnerability_id":"VCID-t4rc-yuj8-n7au","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0746.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0746","reference_id":"","reference_type":"","scores":[{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61526","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6151","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61457","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6143","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61468","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61409","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.6136","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61407","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00411","scoring_system":"epss","scoring_elements":"0.61399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63429","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63437","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63464","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.6348","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63498","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63465","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00446","scoring_system":"epss","scoring_elements":"0.63507","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259928","reference_id":"2259928","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259928"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1660223","reference_id":"show_bug.cgi?id=1660223","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T18:33:56Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1660223"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0746"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t4rc-yuj8-n7au"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51397?format=json","vulnerability_id":"VCID-t8gg-ptc1-qfdw","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4056.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4056","reference_id":"","reference_type":"","scores":[{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69638","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69801","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69751","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69726","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69812","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69755","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69724","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.6968","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69704","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69691","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00605","scoring_system":"epss","scoring_elements":"0.69699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71249","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71214","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71232","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71207","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71286","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.7127","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.713","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00667","scoring_system":"epss","scoring_elements":"0.71307","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4056"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228370","reference_id":"2228370","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228370"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847","reference_id":"buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1820587%2C1824634%2C1839235%2C1842325%2C1843847"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-22T14:25:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4056"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t8gg-ptc1-qfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51395?format=json","vulnerability_id":"VCID-tfny-yt17-mffx","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4054.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4054","reference_id":"","reference_type":"","scores":[{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09461","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09133","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09114","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0927","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09319","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09227","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09132","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09302","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09374","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09353","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09384","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09164","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09281","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09284","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09254","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0924","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4054"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228366","reference_id":"2228366","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228366"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-32/","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-32/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-33/","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-33/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1840777","reference_id":"show_bug.cgi?id=1840777","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:04Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1840777"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4054"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tfny-yt17-mffx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51433?format=json","vulnerability_id":"VCID-tps4-kxe2-5ugb","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6858.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6858","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61868","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61813","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61882","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61769","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61764","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61784","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61828","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61765","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61774","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61718","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63777","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63723","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63776","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63748","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.6376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63788","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63778","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00452","scoring_system":"epss","scoring_elements":"0.63742","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255363","reference_id":"2255363","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255363"},{"reference_url":"https://www.debian.org/security/2023/dsa-5581","reference_id":"dsa-5581","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.debian.org/security/2023/dsa-5581"},{"reference_url":"https://www.debian.org/security/2023/dsa-5582","reference_id":"dsa-5582","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.debian.org/security/2023/dsa-5582"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-54/","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-54/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-55/","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-55/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-56/","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-56/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html","reference_id":"msg00020.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00020.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html","reference_id":"msg00021.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00021.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826791","reference_id":"show_bug.cgi?id=1826791","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-07T20:24:54Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826791"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6858"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tps4-kxe2-5ugb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51408?format=json","vulnerability_id":"VCID-tq43-rx5u-eybv","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4583","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3458","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34974","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34931","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34701","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34682","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34461","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34531","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34569","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34465","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34492","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34561","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35026","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34933","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34978","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35007","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35011","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34975","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.3499","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4583"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236082","reference_id":"2236082","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236082"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-34/","reference_id":"mfsa2023-34","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842030","reference_id":"show_bug.cgi?id=1842030","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-19T19:09:13Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1842030"},{"reference_url":"https://usn.ubuntu.com/6320-1/","reference_id":"USN-6320-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6320-1/"},{"reference_url":"https://usn.ubuntu.com/6405-1/","reference_id":"USN-6405-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6405-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4583"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tq43-rx5u-eybv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51427?format=json","vulnerability_id":"VCID-tutg-2zzk-4uam","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6207","reference_id":"","reference_type":"","scores":[{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61254","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61238","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61132","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61191","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.61153","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00407","scoring_system":"epss","scoring_elements":"0.6118","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.6387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63934","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63932","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63906","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63852","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63879","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63887","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63904","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63917","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250899","reference_id":"2250899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250899"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6207"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tutg-2zzk-4uam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44287?format=json","vulnerability_id":"VCID-uh95-a456-7kbx","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0747.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0747","reference_id":"","reference_type":"","scores":[{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.6358","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63572","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63571","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.6357","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63553","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63501","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.6351","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63537","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.6436","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64214","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64247","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64218","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64262","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64307","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64274","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64299","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00462","scoring_system":"epss","scoring_elements":"0.64352","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259929","reference_id":"2259929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259929"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1764343","reference_id":"show_bug.cgi?id=1764343","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-23T20:11:17Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1764343"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0747"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uh95-a456-7kbx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51387?format=json","vulnerability_id":"VCID-vjw1-g5kk-zuda","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4046","reference_id":"","reference_type":"","scores":[{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43933","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.4381","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43744","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43715","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43828","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43777","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43759","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43684","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43885","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43888","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52849","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52804","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.5283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52798","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52843","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52862","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52898","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52906","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228361","reference_id":"2228361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2228361"},{"reference_url":"https://www.debian.org/security/2023/dsa-5464","reference_id":"dsa-5464","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://www.debian.org/security/2023/dsa-5464"},{"reference_url":"https://www.debian.org/security/2023/dsa-5469","reference_id":"dsa-5469","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://www.debian.org/security/2023/dsa-5469"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-30/","reference_id":"mfsa2023-30","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-31/","reference_id":"mfsa2023-31","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32","reference_id":"mfsa2023-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33","reference_id":"mfsa2023-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-33"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html","reference_id":"msg00008.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00008.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00010.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4460","reference_id":"RHSA-2023:4460","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4460"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4461","reference_id":"RHSA-2023:4461","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4461"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4462","reference_id":"RHSA-2023:4462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4463","reference_id":"RHSA-2023:4463","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4463"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4464","reference_id":"RHSA-2023:4464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4465","reference_id":"RHSA-2023:4465","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4465"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4468","reference_id":"RHSA-2023:4468","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4468"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4469","reference_id":"RHSA-2023:4469","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4469"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4492","reference_id":"RHSA-2023:4492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4493","reference_id":"RHSA-2023:4493","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4493"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4494","reference_id":"RHSA-2023:4494","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4495","reference_id":"RHSA-2023:4495","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4495"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4496","reference_id":"RHSA-2023:4496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4497","reference_id":"RHSA-2023:4497","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4497"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4499","reference_id":"RHSA-2023:4499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4500","reference_id":"RHSA-2023:4500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4500"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837686","reference_id":"show_bug.cgi?id=1837686","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T15:25:12Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837686"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"},{"reference_url":"https://usn.ubuntu.com/6333-1/","reference_id":"USN-6333-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6333-1/"},{"reference_url":"https://usn.ubuntu.com/6406-1/","reference_id":"USN-6406-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6406-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4046"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vjw1-g5kk-zuda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51428?format=json","vulnerability_id":"VCID-vma9-r6uy-p7c1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6208","reference_id":"","reference_type":"","scores":[{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59193","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59122","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59203","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59082","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59139","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00374","scoring_system":"epss","scoring_elements":"0.59095","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63985","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63973","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64004","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.64003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63975","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.6392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63947","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63974","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63986","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250900","reference_id":"2250900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250900"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6208"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vma9-r6uy-p7c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51444?format=json","vulnerability_id":"VCID-vmm4-dq3p-kqhu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37211","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66098","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66033","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66013","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66044","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65953","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66089","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68312","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219751","reference_id":"2219751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219751"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450","reference_id":"buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"},{"reference_url":"https://usn.ubuntu.com/6227-1/","reference_id":"USN-6227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6227-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-37211"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmm4-dq3p-kqhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51420?format=json","vulnerability_id":"VCID-vw4n-4r41-ukbp","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5727.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5727","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43605","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43671","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43589","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43461","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43536","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43554","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43491","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43521","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43585","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43783","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43767","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43771","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43795","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43666","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5727"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245902","reference_id":"2245902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245902"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1847180","reference_id":"show_bug.cgi?id=1847180","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:47:05Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1847180"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5727"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vw4n-4r41-ukbp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44323?format=json","vulnerability_id":"VCID-vwkf-9gfp-d3cy","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0749.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0749","reference_id":"","reference_type":"","scores":[{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55715","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55712","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55672","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5571","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55698","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55646","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55644","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55669","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56648","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56593","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56529","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56483","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56532","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56596","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56546","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5657","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56632","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259930","reference_id":"2259930","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259930"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1813463","reference_id":"show_bug.cgi?id=1813463","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-29T19:41:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1813463"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0749"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vwkf-9gfp-d3cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44199?format=json","vulnerability_id":"VCID-xan8-8fq6-yfgd","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0742.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0742","reference_id":"","reference_type":"","scores":[{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82773","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82738","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82744","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82727","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.8272","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82684","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01786","scoring_system":"epss","scoring_elements":"0.82698","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83164","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83001","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83033","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83039","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83062","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83082","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83102","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83103","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83118","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01842","scoring_system":"epss","scoring_elements":"0.83153","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259927","reference_id":"2259927","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259927"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1867152","reference_id":"show_bug.cgi?id=1867152","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:26Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1867152"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0742"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xan8-8fq6-yfgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44342?format=json","vulnerability_id":"VCID-xg25-xm9t-cfb8","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0750.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0750","reference_id":"","reference_type":"","scores":[{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.81022","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.81021","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.80984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.80992","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.81006","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.80989","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.80982","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.80955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.80935","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01479","scoring_system":"epss","scoring_elements":"0.80957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81469","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.8134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81348","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81369","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81389","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81411","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81408","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81426","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01525","scoring_system":"epss","scoring_elements":"0.81465","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259931","reference_id":"2259931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259931"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1863083","reference_id":"show_bug.cgi?id=1863083","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:17Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1863083"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0750"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xg25-xm9t-cfb8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51392?format=json","vulnerability_id":"VCID-xrg1-azru-5qf1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4051","reference_id":"","reference_type":"","scores":[{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34193","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34269","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34196","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34236","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0014","scoring_system":"epss","scoring_elements":"0.34301","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36114","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36115","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.35997","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36065","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36091","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36002","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36024","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36094","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36232","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36202","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4051"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236076","reference_id":"2236076","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236076"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1821884","reference_id":"show_bug.cgi?id=1821884","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:40:45Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1821884"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4051"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xrg1-azru-5qf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/44403?format=json","vulnerability_id":"VCID-y8xv-ss2c-4bhk","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0753.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0753","reference_id":"","reference_type":"","scores":[{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55686","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.5567","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55612","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55628","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55571","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55524","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55577","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55602","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55659","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00327","scoring_system":"epss","scoring_elements":"0.55585","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57785","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57791","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57811","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.5784","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57842","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57858","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57844","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00355","scoring_system":"epss","scoring_elements":"0.57843","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259933","reference_id":"2259933","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259933"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://security.gentoo.org/glsa/202402-26","reference_id":"GLSA-202402-26","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-26"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-01/","reference_id":"mfsa2024-01","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-01/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-02"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-02/","reference_id":"mfsa2024-02","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-02/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-04"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-04/","reference_id":"mfsa2024-04","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-04/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00015.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html","reference_id":"msg00022.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/01/msg00022.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0559","reference_id":"RHSA-2024:0559","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0559"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0565","reference_id":"RHSA-2024:0565","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0565"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0596","reference_id":"RHSA-2024:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0598","reference_id":"RHSA-2024:0598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0600","reference_id":"RHSA-2024:0600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0600"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0601","reference_id":"RHSA-2024:0601","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0601"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0602","reference_id":"RHSA-2024:0602","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0602"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0603","reference_id":"RHSA-2024:0603","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0603"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0604","reference_id":"RHSA-2024:0604","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0604"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0605","reference_id":"RHSA-2024:0605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0605"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0608","reference_id":"RHSA-2024:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0609","reference_id":"RHSA-2024:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0615","reference_id":"RHSA-2024:0615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0616","reference_id":"RHSA-2024:0616","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0616"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0618","reference_id":"RHSA-2024:0618","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0619","reference_id":"RHSA-2024:0619","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0619"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0622","reference_id":"RHSA-2024:0622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0623","reference_id":"RHSA-2024:0623","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0623"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1870262","reference_id":"show_bug.cgi?id=1870262","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:23Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1870262"},{"reference_url":"https://usn.ubuntu.com/6610-1/","reference_id":"USN-6610-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6610-1/"},{"reference_url":"https://usn.ubuntu.com/6669-1/","reference_id":"USN-6669-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6669-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2024-0753"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8xv-ss2c-4bhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51430?format=json","vulnerability_id":"VCID-yd2q-assr-v3er","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6212","reference_id":"","reference_type":"","scores":[{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53106","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53212","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53148","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53223","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53141","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00297","scoring_system":"epss","scoring_elements":"0.53114","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59929","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59994","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59975","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60014","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.60007","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59979","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59984","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59944","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59954","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59924","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.59974","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250902","reference_id":"2250902","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2250902"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782","reference_id":"buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1658432%2C1820983%2C1829252%2C1856072%2C1856091%2C1859030%2C1860943%2C1862782"},{"reference_url":"https://www.debian.org/security/2023/dsa-5561","reference_id":"dsa-5561","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.debian.org/security/2023/dsa-5561"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-49/","reference_id":"mfsa2023-49","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-49/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-50"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-50/","reference_id":"mfsa2023-50","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-50/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-52"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-52/","reference_id":"mfsa2023-52","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-52/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html","reference_id":"msg00017.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00017.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html","reference_id":"msg00030.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T18:37:05Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00030.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7499","reference_id":"RHSA-2023:7499","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7499"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7500","reference_id":"RHSA-2023:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7501","reference_id":"RHSA-2023:7501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7502","reference_id":"RHSA-2023:7502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7503","reference_id":"RHSA-2023:7503","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7503"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7504","reference_id":"RHSA-2023:7504","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7504"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7505","reference_id":"RHSA-2023:7505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7506","reference_id":"RHSA-2023:7506","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7506"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7507","reference_id":"RHSA-2023:7507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7508","reference_id":"RHSA-2023:7508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7509","reference_id":"RHSA-2023:7509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7510","reference_id":"RHSA-2023:7510","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7510"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7511","reference_id":"RHSA-2023:7511","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7511"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7512","reference_id":"RHSA-2023:7512","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7512"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7547","reference_id":"RHSA-2023:7547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7569","reference_id":"RHSA-2023:7569","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7569"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7570","reference_id":"RHSA-2023:7570","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7570"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7573","reference_id":"RHSA-2023:7573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7573"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7574","reference_id":"RHSA-2023:7574","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7574"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7577","reference_id":"RHSA-2023:7577","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7577"},{"reference_url":"https://usn.ubuntu.com/6509-1/","reference_id":"USN-6509-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6509-1/"},{"reference_url":"https://usn.ubuntu.com/6515-1/","reference_id":"USN-6515-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6515-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6212"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yd2q-assr-v3er"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51394?format=json","vulnerability_id":"VCID-ygrd-4scr-wkau","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4053.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4053","reference_id":"","reference_type":"","scores":[{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34454","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3446","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34335","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34406","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34445","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3434","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34366","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34434","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34904","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3481","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34855","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3485","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34826","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34865","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34849","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34547","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4053"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236078","reference_id":"2236078","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236078"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-29/","reference_id":"mfsa2023-29","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-36"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-36/","reference_id":"mfsa2023-36","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-36/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-38/","reference_id":"mfsa2023-38","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4945","reference_id":"RHSA-2023:4945","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4945"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4946","reference_id":"RHSA-2023:4946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4947","reference_id":"RHSA-2023:4947","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4948","reference_id":"RHSA-2023:4948","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4948"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4949","reference_id":"RHSA-2023:4949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4950","reference_id":"RHSA-2023:4950","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4950"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4951","reference_id":"RHSA-2023:4951","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4951"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4952","reference_id":"RHSA-2023:4952","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4952"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4954","reference_id":"RHSA-2023:4954","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4954"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4955","reference_id":"RHSA-2023:4955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4955"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4956","reference_id":"RHSA-2023:4956","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4956"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4957","reference_id":"RHSA-2023:4957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4958","reference_id":"RHSA-2023:4958","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4958"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4959","reference_id":"RHSA-2023:4959","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4959"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5019","reference_id":"RHSA-2023:5019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5019"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839079","reference_id":"show_bug.cgi?id=1839079","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-22T14:37:53Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1839079"},{"reference_url":"https://usn.ubuntu.com/6267-1/","reference_id":"USN-6267-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6267-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-4053"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ygrd-4scr-wkau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51436?format=json","vulnerability_id":"VCID-zhu4-sy56-1yea","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6861","reference_id":"","reference_type":"","scores":[{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6171","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61639","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61658","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61663","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66126","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.6604","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66061","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66117","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65975","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65995","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66006","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65981","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66027","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66071","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255367","reference_id":"2255367","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2255367"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54","reference_id":"mfsa2023-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-54"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55","reference_id":"mfsa2023-55","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-55"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56","reference_id":"mfsa2023-56","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0001","reference_id":"RHSA-2024:0001","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0002","reference_id":"RHSA-2024:0002","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0003","reference_id":"RHSA-2024:0003","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0004","reference_id":"RHSA-2024:0004","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0005","reference_id":"RHSA-2024:0005","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0005"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0011","reference_id":"RHSA-2024:0011","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0012","reference_id":"RHSA-2024:0012","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0012"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0019","reference_id":"RHSA-2024:0019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0021","reference_id":"RHSA-2024:0021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0022","reference_id":"RHSA-2024:0022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0023","reference_id":"RHSA-2024:0023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0024","reference_id":"RHSA-2024:0024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0025","reference_id":"RHSA-2024:0025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0026","reference_id":"RHSA-2024:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0027","reference_id":"RHSA-2024:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0028","reference_id":"RHSA-2024:0028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0029","reference_id":"RHSA-2024:0029","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0029"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0030","reference_id":"RHSA-2024:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0030"},{"reference_url":"https://usn.ubuntu.com/6562-1/","reference_id":"USN-6562-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6562-1/"},{"reference_url":"https://usn.ubuntu.com/6563-1/","reference_id":"USN-6563-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6563-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-6861"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhu4-sy56-1yea"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51419?format=json","vulnerability_id":"VCID-zjn8-79ab-tqd3","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5726","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38367","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38476","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38386","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38268","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38339","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3835","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3826","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38286","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38359","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38774","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38703","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38712","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38758","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38657","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.385","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5726"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245901","reference_id":"2245901","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245901"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846205","reference_id":"show_bug.cgi?id=1846205","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:53:41Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1846205"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5726"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zjn8-79ab-tqd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51418?format=json","vulnerability_id":"VCID-zqpe-9hvc-vkbp","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5725.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5725","reference_id":"","reference_type":"","scores":[{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54425","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00313","scoring_system":"epss","scoring_elements":"0.54465","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61793","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61649","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61691","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61684","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6163","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61677","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61739","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61696","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61725","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61778","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.61659","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00415","scoring_system":"epss","scoring_elements":"0.6168","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245900","reference_id":"2245900","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2245900"},{"reference_url":"https://www.debian.org/security/2023/dsa-5535","reference_id":"dsa-5535","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5535"},{"reference_url":"https://www.debian.org/security/2023/dsa-5538","reference_id":"dsa-5538","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://www.debian.org/security/2023/dsa-5538"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-45"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-45/","reference_id":"mfsa2023-45","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-45/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-46"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-46/","reference_id":"mfsa2023-46","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-46/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-47/","reference_id":"mfsa2023-47","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-47/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html","reference_id":"msg00037.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00037.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html","reference_id":"msg00042.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00042.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6162","reference_id":"RHSA-2023:6162","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6185","reference_id":"RHSA-2023:6185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6186","reference_id":"RHSA-2023:6186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6187","reference_id":"RHSA-2023:6187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6188","reference_id":"RHSA-2023:6188","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6189","reference_id":"RHSA-2023:6189","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6189"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6191","reference_id":"RHSA-2023:6191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6194","reference_id":"RHSA-2023:6194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6195","reference_id":"RHSA-2023:6195","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6195"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6196","reference_id":"RHSA-2023:6196","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6197","reference_id":"RHSA-2023:6197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6198","reference_id":"RHSA-2023:6198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6199","reference_id":"RHSA-2023:6199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6199"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1845739","reference_id":"show_bug.cgi?id=1845739","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-11T18:54:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1845739"},{"reference_url":"https://usn.ubuntu.com/6456-1/","reference_id":"USN-6456-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6456-1/"},{"reference_url":"https://usn.ubuntu.com/6468-1/","reference_id":"USN-6468-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6468-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/79188?format=json","purl":"pkg:ebuild/mail-client/thunderbird@115.7.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}],"aliases":["CVE-2023-5725"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqpe-9hvc-vkbp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/thunderbird@115.7.0"}