{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","type":"ebuild","namespace":"www-client","name":"firefox","version":"107.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"109.0","latest_non_vulnerable_version":"137.0.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47156?format=json","vulnerability_id":"VCID-1hak-cqnh-tqay","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45406.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45406","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61962","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61882","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61898","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61852","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.619","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61866","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143200","reference_id":"2143200","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143200"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791975","reference_id":"show_bug.cgi?id=1791975","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791975"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45406"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1hak-cqnh-tqay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61900?format=json","vulnerability_id":"VCID-2y2t-51pa-m3gv","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45417","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34101","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33692","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34066","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34114","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3421","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34115","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34145","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38718","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38839","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38755","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38631","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38705","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45417"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:48:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1794508","reference_id":"show_bug.cgi?id=1794508","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:48:41Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1794508"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45417"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2y2t-51pa-m3gv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61901?format=json","vulnerability_id":"VCID-73tn-gwzm-1bam","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45419","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24878","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25029","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24806","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24862","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24891","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25068","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24973","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24933","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42225","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.4236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42277","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42209","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45419"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:21:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1716082","reference_id":"show_bug.cgi?id=1716082","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:21:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1716082"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45419"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73tn-gwzm-1bam"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47162?format=json","vulnerability_id":"VCID-7t2x-pksm-ubgy","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45416.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45416","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41834","published_at":"2026-05-09T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4189","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41749","published_at":"2026-05-05T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143240","reference_id":"2143240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143240"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793676","reference_id":"show_bug.cgi?id=1793676","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793676"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45416"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7t2x-pksm-ubgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47163?format=json","vulnerability_id":"VCID-7vk4-9vwa-pbe9","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45418.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45418","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39222","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3926","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39331","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39343","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40411","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4047","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40326","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40553","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143241","reference_id":"2143241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143241"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45418"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vk4-9vwa-pbe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61899?format=json","vulnerability_id":"VCID-7xxf-jqdy-xya3","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45415","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29468","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2997","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29715","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29601","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29393","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29456","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30018","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29894","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29935","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29889","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29791","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45415"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T14:53:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793551","reference_id":"show_bug.cgi?id=1793551","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-04-15T14:53:58Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793551"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45415"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xxf-jqdy-xya3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61896?format=json","vulnerability_id":"VCID-8d85-r58y-4qez","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45407","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.616","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61468","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61532","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61547","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61542","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61492","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6154","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61466","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61528","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6155","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61536","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61516","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61556","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61545","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45407"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:44:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793314","reference_id":"show_bug.cgi?id=1793314","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:44:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793314"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45407"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8d85-r58y-4qez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47155?format=json","vulnerability_id":"VCID-8q1b-fdq4-aqha","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45405.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45405","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39198","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39194","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3922","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3914","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40315","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40463","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40296","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143199","reference_id":"2143199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143199"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791314","reference_id":"show_bug.cgi?id=1791314","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791314"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45405"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8q1b-fdq4-aqha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47160?format=json","vulnerability_id":"VCID-8s22-tw1u-7kbw","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45411.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45411.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45411","reference_id":"","reference_type":"","scores":[{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45192","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45199","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46938","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46994","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46857","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.4692","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143204","reference_id":"2143204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143204"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311","reference_id":"show_bug.cgi?id=1790311","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45411"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8s22-tw1u-7kbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61898?format=json","vulnerability_id":"VCID-942z-zc2a-n3cc","summary":"Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45413","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37686","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37827","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37709","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37599","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37669","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38193","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38114","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38122","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3814","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38125","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38106","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38042","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45413"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:01:41Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791201","reference_id":"show_bug.cgi?id=1791201","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:01:41Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791201"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45413"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-942z-zc2a-n3cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47159?format=json","vulnerability_id":"VCID-an3w-wb6n-zuee","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45410.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45410","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35898","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36042","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36073","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36743","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36769","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36651","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36719","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143203","reference_id":"2143203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143203"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658869","reference_id":"show_bug.cgi?id=1658869","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658869"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45410"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-an3w-wb6n-zuee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47157?format=json","vulnerability_id":"VCID-fpw1-j3wb-xfd5","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45408.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45408","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39424","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39344","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39409","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39554","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143201","reference_id":"2143201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143201"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45408"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpw1-j3wb-xfd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47154?format=json","vulnerability_id":"VCID-mm7x-rfzg-uqfc","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45404.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45404.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45404","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38424","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38397","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3846","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39632","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.3955","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39615","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143198","reference_id":"2143198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143198"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790815","reference_id":"show_bug.cgi?id=1790815","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790815"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45404"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mm7x-rfzg-uqfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31417?format=json","vulnerability_id":"VCID-pba8-g9ts-43bw","summary":"Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40674.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40674.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40674","reference_id":"","reference_type":"","scores":[{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78052","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77951","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77913","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.7793","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77903","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78035","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.78006","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77996","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01087","scoring_system":"epss","scoring_elements":"0.77984","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-40674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019761","reference_id":"1019761","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1019761"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130769","reference_id":"2130769","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2130769"},{"reference_url":"https://github.com/libexpat/libexpat/pull/629","reference_id":"629","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://github.com/libexpat/libexpat/pull/629"},{"reference_url":"https://github.com/libexpat/libexpat/pull/640","reference_id":"640","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://github.com/libexpat/libexpat/pull/640"},{"reference_url":"https://security.archlinux.org/AVG-2815","reference_id":"AVG-2815","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2815"},{"reference_url":"https://www.debian.org/security/2022/dsa-5236","reference_id":"dsa-5236","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://www.debian.org/security/2022/dsa-5236"},{"reference_url":"https://security.gentoo.org/glsa/202209-24","reference_id":"GLSA-202209-24","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://security.gentoo.org/glsa/202209-24"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/","reference_id":"GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GSVZN3IJ6OCPSJL7AEX3ZHSHAHFOGESK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J2IGJNHFV53PYST7VQV3T4NHVYAMXA36/","reference_id":"J2IGJNHFV53PYST7VQV3T4NHVYAMXA36","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J2IGJNHFV53PYST7VQV3T4NHVYAMXA36/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/","reference_id":"LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQB6FJAM5YQ35SF5B2MN25Y2FX56EOEZ/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00029.html","reference_id":"msg00029.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/09/msg00029.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221028-0008/","reference_id":"ntap-20221028-0008","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221028-0008/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6831","reference_id":"RHSA-2022:6831","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6831"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6832","reference_id":"RHSA-2022:6832","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6832"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6833","reference_id":"RHSA-2022:6833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6833"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6834","reference_id":"RHSA-2022:6834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6838","reference_id":"RHSA-2022:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6878","reference_id":"RHSA-2022:6878","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6878"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6921","reference_id":"RHSA-2022:6921","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6921"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6967","reference_id":"RHSA-2022:6967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6995","reference_id":"RHSA-2022:6995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6996","reference_id":"RHSA-2022:6996","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6996"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6997","reference_id":"RHSA-2022:6997","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6997"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6998","reference_id":"RHSA-2022:6998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7019","reference_id":"RHSA-2022:7019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7020","reference_id":"RHSA-2022:7020","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7020"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7021","reference_id":"RHSA-2022:7021","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7022","reference_id":"RHSA-2022:7022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7023","reference_id":"RHSA-2022:7023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7024","reference_id":"RHSA-2022:7024","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7024"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7025","reference_id":"RHSA-2022:7025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7026","reference_id":"RHSA-2022:7026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8598","reference_id":"RHSA-2022:8598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8841","reference_id":"RHSA-2022:8841","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8841"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:3068","reference_id":"RHSA-2023:3068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:3068"},{"reference_url":"https://usn.ubuntu.com/5638-1/","reference_id":"USN-5638-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5638-1/"},{"reference_url":"https://usn.ubuntu.com/5638-2/","reference_id":"USN-5638-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5638-2/"},{"reference_url":"https://usn.ubuntu.com/5638-4/","reference_id":"USN-5638-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5638-4/"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2ZKEPGFCZ7R6DRVH3K6RBJPT42ZBEG/","reference_id":"WE2ZKEPGFCZ7R6DRVH3K6RBJPT42ZBEG","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WE2ZKEPGFCZ7R6DRVH3K6RBJPT42ZBEG/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/","reference_id":"XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-30T19:17:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XCGBVQQ47URGJAZWHCISHDWF6QBTV2LE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-40674"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pba8-g9ts-43bw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47161?format=json","vulnerability_id":"VCID-uuxf-cyfq-p3e2","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45412.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45412","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43703","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43734","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43727","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45152","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45234","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4507","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45135","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143205","reference_id":"2143205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143205"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791029","reference_id":"show_bug.cgi?id=1791029","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791029"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45412"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uuxf-cyfq-p3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47153?format=json","vulnerability_id":"VCID-y3v2-cyyc-yyep","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45403.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45403.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45403","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40493","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40534","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40513","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.4053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.4172","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41634","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41702","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143197","reference_id":"2143197","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143197"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1762078","reference_id":"show_bug.cgi?id=1762078","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1762078"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45403"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3v2-cyyc-yyep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47158?format=json","vulnerability_id":"VCID-yc74-5kag-2bdn","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45409.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45409","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51261","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51167","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143202","reference_id":"2143202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143202"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1796901","reference_id":"show_bug.cgi?id=1796901","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1796901"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45409"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yc74-5kag-2bdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47165?format=json","vulnerability_id":"VCID-ydz6-761h-jbeq","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45421.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45421","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51261","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51167","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143243","reference_id":"2143243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143243"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1767920%2C1789808%2C1794061","reference_id":"buglist.cgi?bug_id=1767920%2C1789808%2C1794061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1767920%2C1789808%2C1794061"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45421"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydz6-761h-jbeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47164?format=json","vulnerability_id":"VCID-yuhg-jeet-cffp","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45420.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45420","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34004","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34086","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3487","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34761","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34834","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34999","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34979","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143242","reference_id":"2143242","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143242"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85766?format=json","purl":"pkg:ebuild/www-client/firefox@102.5.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@102.5.0"},{"url":"http://public2.vulnerablecode.io/api/packages/85767?format=json","purl":"pkg:ebuild/www-client/firefox@107.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}],"aliases":["CVE-2022-45420"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yuhg-jeet-cffp"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox@107.0"}