{"url":"http://public2.vulnerablecode.io/api/packages/92585?format=json","purl":"pkg:rpm/redhat/thunderbird@128.2.0-1?arch=el8_6","type":"rpm","namespace":"redhat","name":"thunderbird","version":"128.2.0-1","qualifiers":{"arch":"el8_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36122?format=json","vulnerability_id":"VCID-3ayf-d2s1-67ff","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8382","reference_id":"","reference_type":"","scores":[{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47401","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47461","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47509","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47517","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47457","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47451","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47456","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47431","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00242","scoring_system":"epss","scoring_elements":"0.47452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00267","scoring_system":"epss","scoring_elements":"0.50206","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8382"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309428","reference_id":"2309428","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309428"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-39/","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-39/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-40/","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-40/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-41","reference_id":"mfsa2024-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-41/","reference_id":"mfsa2024-41","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-43/","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-43/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-44","reference_id":"mfsa2024-44","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-44"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-44/","reference_id":"mfsa2024-44","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-44/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6681","reference_id":"RHSA-2024:6681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6682","reference_id":"RHSA-2024:6682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6838","reference_id":"RHSA-2024:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6891","reference_id":"RHSA-2024:6891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6892","reference_id":"RHSA-2024:6892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1906744","reference_id":"show_bug.cgi?id=1906744","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-30T16:38:10Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1906744"},{"reference_url":"https://usn.ubuntu.com/6992-1/","reference_id":"USN-6992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6992-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-8382"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ayf-d2s1-67ff"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36128?format=json","vulnerability_id":"VCID-3sjh-f264-m3g7","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8387.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8387","reference_id":"","reference_type":"","scores":[{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67773","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67668","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67688","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67669","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6772","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67744","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67746","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.6776","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00543","scoring_system":"epss","scoring_elements":"0.67771","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8387"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309433","reference_id":"2309433","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309433"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009","reference_id":"buglist.cgi?bug_id=1857607%2C1911858%2C1914009","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1857607%2C1911858%2C1914009"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-39/","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-39/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-40/","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-40/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-43/","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:41:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-43/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6681","reference_id":"RHSA-2024:6681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6682","reference_id":"RHSA-2024:6682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6838","reference_id":"RHSA-2024:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6891","reference_id":"RHSA-2024:6891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6892","reference_id":"RHSA-2024:6892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6892"},{"reference_url":"https://usn.ubuntu.com/6992-1/","reference_id":"USN-6992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6992-1/"}],"fixed_packages":[],"aliases":["CVE-2024-8387"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3sjh-f264-m3g7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36130?format=json","vulnerability_id":"VCID-62zr-8w1c-bydt","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8394.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8394","reference_id":"","reference_type":"","scores":[{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58376","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58364","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58426","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58379","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58353","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58406","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58408","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58422","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58389","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60775","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8394"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310481","reference_id":"2310481","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310481"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-43/","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-43/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895737","reference_id":"show_bug.cgi?id=1895737","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-06T19:38:19Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895737"}],"fixed_packages":[],"aliases":["CVE-2024-8394"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-62zr-8w1c-bydt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36125?format=json","vulnerability_id":"VCID-hetc-sghb-1fcx","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8384.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8384","reference_id":"","reference_type":"","scores":[{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55177","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55241","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55199","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55218","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55237","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55226","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55201","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55148","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.55157","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00321","scoring_system":"epss","scoring_elements":"0.5522","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8384"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8384"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309430","reference_id":"2309430","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309430"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-39/","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-39/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-40/","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-40/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-41","reference_id":"mfsa2024-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-41/","reference_id":"mfsa2024-41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-43/","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-43/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-44","reference_id":"mfsa2024-44","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-44"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-44/","reference_id":"mfsa2024-44","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-44/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6681","reference_id":"RHSA-2024:6681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6682","reference_id":"RHSA-2024:6682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6838","reference_id":"RHSA-2024:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6891","reference_id":"RHSA-2024:6891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6892","reference_id":"RHSA-2024:6892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1911288","reference_id":"show_bug.cgi?id=1911288","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:49:08Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1911288"},{"reference_url":"https://usn.ubuntu.com/6992-1/","reference_id":"USN-6992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6992-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-8384"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hetc-sghb-1fcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62620?format=json","vulnerability_id":"VCID-m9h1-aw7r-jqb2","summary":"An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7652.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7652","reference_id":"","reference_type":"","scores":[{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.5104","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.5108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51124","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51062","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51146","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51102","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51118","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.5114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00277","scoring_system":"epss","scoring_elements":"0.51096","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310490","reference_id":"2310490","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2310490"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-29","reference_id":"mfsa2024-29","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-29/","reference_id":"mfsa2024-29","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-29/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-30","reference_id":"mfsa2024-30","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-30"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-30/","reference_id":"mfsa2024-30","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-30/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-31","reference_id":"mfsa2024-31","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-31"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-31/","reference_id":"mfsa2024-31","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-31/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-32","reference_id":"mfsa2024-32","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-32/","reference_id":"mfsa2024-32","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-32/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6681","reference_id":"RHSA-2024:6681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6682","reference_id":"RHSA-2024:6682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6838","reference_id":"RHSA-2024:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6891","reference_id":"RHSA-2024:6891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6892","reference_id":"RHSA-2024:6892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1901411","reference_id":"show_bug.cgi?id=1901411","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1901411"}],"fixed_packages":[],"aliases":["CVE-2024-7652"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m9h1-aw7r-jqb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36127?format=json","vulnerability_id":"VCID-pst5-367g-h7cs","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8386.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8386","reference_id":"","reference_type":"","scores":[{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50595","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50605","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50627","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50622","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50543","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.5057","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50575","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00271","scoring_system":"epss","scoring_elements":"0.50617","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53295","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53258","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00299","scoring_system":"epss","scoring_elements":"0.53285","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8386"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309432","reference_id":"2309432","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309432"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-39/","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-39/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-40/","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-40/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-43/","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-43/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6681","reference_id":"RHSA-2024:6681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6682","reference_id":"RHSA-2024:6682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6838","reference_id":"RHSA-2024:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6891","reference_id":"RHSA-2024:6891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6892","reference_id":"RHSA-2024:6892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1907032","reference_id":"show_bug.cgi?id=1907032","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1907032"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909163","reference_id":"show_bug.cgi?id=1909163","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909163"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909529","reference_id":"show_bug.cgi?id=1909529","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-03T15:44:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909529"},{"reference_url":"https://usn.ubuntu.com/6992-1/","reference_id":"USN-6992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6992-1/"}],"fixed_packages":[],"aliases":["CVE-2024-8386"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pst5-367g-h7cs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36126?format=json","vulnerability_id":"VCID-qd97-asaa-2fey","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8385.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8385","reference_id":"","reference_type":"","scores":[{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51202","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51181","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51219","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51216","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51259","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51238","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51224","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51269","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51247","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00278","scoring_system":"epss","scoring_elements":"0.51195","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8385"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309431","reference_id":"2309431","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309431"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-39/","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-39/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-40/","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-40/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-43/","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-43/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6681","reference_id":"RHSA-2024:6681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6682","reference_id":"RHSA-2024:6682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6838","reference_id":"RHSA-2024:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6891","reference_id":"RHSA-2024:6891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6892","reference_id":"RHSA-2024:6892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1911909","reference_id":"show_bug.cgi?id=1911909","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:46:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1911909"},{"reference_url":"https://usn.ubuntu.com/6992-1/","reference_id":"USN-6992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6992-1/"}],"fixed_packages":[],"aliases":["CVE-2024-8385"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qd97-asaa-2fey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36121?format=json","vulnerability_id":"VCID-ux24-3d83-23c6","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-8381.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8381","reference_id":"","reference_type":"","scores":[{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93646","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93672","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93679","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93683","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93685","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93682","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11622","scoring_system":"epss","scoring_elements":"0.93687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12468","scoring_system":"epss","scoring_elements":"0.93891","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12468","scoring_system":"epss","scoring_elements":"0.93882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12468","scoring_system":"epss","scoring_elements":"0.93895","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8381"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8381"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309427","reference_id":"2309427","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2309427"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-39"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-39/","reference_id":"mfsa2024-39","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-39/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-40"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-40/","reference_id":"mfsa2024-40","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-40/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-41","reference_id":"mfsa2024-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-41"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-41/","reference_id":"mfsa2024-41","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-41/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-43"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-43/","reference_id":"mfsa2024-43","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-43/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-44","reference_id":"mfsa2024-44","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-44"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-44/","reference_id":"mfsa2024-44","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-44/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6681","reference_id":"RHSA-2024:6681","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6681"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6682","reference_id":"RHSA-2024:6682","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6682"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6683","reference_id":"RHSA-2024:6683","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6683"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6684","reference_id":"RHSA-2024:6684","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6719","reference_id":"RHSA-2024:6719","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6719"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6720","reference_id":"RHSA-2024:6720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6721","reference_id":"RHSA-2024:6721","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6721"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6722","reference_id":"RHSA-2024:6722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6723","reference_id":"RHSA-2024:6723","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6723"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6782","reference_id":"RHSA-2024:6782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6786","reference_id":"RHSA-2024:6786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6816","reference_id":"RHSA-2024:6816","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6816"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6838","reference_id":"RHSA-2024:6838","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6838"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6839","reference_id":"RHSA-2024:6839","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6839"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6850","reference_id":"RHSA-2024:6850","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6850"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6891","reference_id":"RHSA-2024:6891","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6891"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6892","reference_id":"RHSA-2024:6892","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6892"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1912715","reference_id":"show_bug.cgi?id=1912715","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-03T15:55:45Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1912715"},{"reference_url":"https://usn.ubuntu.com/6992-1/","reference_id":"USN-6992-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6992-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-8381"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ux24-3d83-23c6"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@128.2.0-1%3Farch=el8_6"}