{"url":"http://public2.vulnerablecode.io/api/packages/92755?format=json","purl":"pkg:rpm/redhat/thunderbird@115.14.0-1?arch=el9_4","type":"rpm","namespace":"redhat","name":"thunderbird","version":"115.14.0-1","qualifiers":{"arch":"el9_4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36106?format=json","vulnerability_id":"VCID-2cuh-xyst-rbgv","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7518.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7518","reference_id":"","reference_type":"","scores":[{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54872","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54841","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.549","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54883","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54859","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54897","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54899","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54879","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54854","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54874","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00318","scoring_system":"epss","scoring_elements":"0.54848","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7518"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303135","reference_id":"2303135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303135"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1875354","reference_id":"show_bug.cgi?id=1875354","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-06T17:58:37Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1875354"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7518"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2cuh-xyst-rbgv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36107?format=json","vulnerability_id":"VCID-2pvz-3cmq-53dk","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json","reference_id":"","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7519.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7519","reference_id":"","reference_type":"","scores":[{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58785","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.588","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58786","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58763","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58805","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58784","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58806","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58829","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58825","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.5883","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303136","reference_id":"2303136","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303136"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-34/","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-38/","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1902307","reference_id":"show_bug.cgi?id=1902307","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:42:21Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1902307"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7519"],"risk_score":4.3,"exploitability":"0.5","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pvz-3cmq-53dk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36116?format=json","vulnerability_id":"VCID-957q-jagj-9kg7","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7527","reference_id":"","reference_type":"","scores":[{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46952","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47002","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46991","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46998","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47001","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46999","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47004","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47055","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47059","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46996","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47023","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303144","reference_id":"2303144","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303144"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-34/","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-38/","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871303","reference_id":"show_bug.cgi?id=1871303","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:19:12Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1871303"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7527"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-957q-jagj-9kg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36108?format=json","vulnerability_id":"VCID-drjc-gxrt-q7ha","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7520","reference_id":"","reference_type":"","scores":[{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71027","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70889","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70907","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70882","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70926","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70932","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70978","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.70986","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00655","scoring_system":"epss","scoring_elements":"0.71028","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7520"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303137","reference_id":"2303137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303137"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1903041","reference_id":"show_bug.cgi?id=1903041","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T15:23:43Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1903041"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7520"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drjc-gxrt-q7ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36110?format=json","vulnerability_id":"VCID-s556-eg79-77gu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7522.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7522","reference_id":"","reference_type":"","scores":[{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47941","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.4793","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47914","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47931","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47884","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47935","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47947","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47992","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47997","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47933","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00247","scoring_system":"epss","scoring_elements":"0.47955","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303139","reference_id":"2303139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303139"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-34/","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-38/","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1906727","reference_id":"show_bug.cgi?id=1906727","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-08T15:56:53Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1906727"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7522"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s556-eg79-77gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36109?format=json","vulnerability_id":"VCID-tegn-2y58-t3de","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7521.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7521","reference_id":"","reference_type":"","scores":[{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.494","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49434","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49444","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49411","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49441","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49445","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49391","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00261","scoring_system":"epss","scoring_elements":"0.49458","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303138","reference_id":"2303138","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303138"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-34/","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-38/","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1904644","reference_id":"show_bug.cgi?id=1904644","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:47:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1904644"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7521"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tegn-2y58-t3de"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36115?format=json","vulnerability_id":"VCID-xevc-xbcg-1yct","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7526.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7526","reference_id":"","reference_type":"","scores":[{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.5057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50617","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50609","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50598","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50629","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50578","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50626","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50634","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00272","scoring_system":"epss","scoring_elements":"0.50671","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303143","reference_id":"2303143","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303143"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-34/","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-38/","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1910306","reference_id":"show_bug.cgi?id=1910306","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-07T20:50:27Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1910306"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7526"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xevc-xbcg-1yct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36114?format=json","vulnerability_id":"VCID-xyqa-esey-73e1","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7525.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7525","reference_id":"","reference_type":"","scores":[{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33242","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33499","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33465","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33582","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33449","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33437","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00137","scoring_system":"epss","scoring_elements":"0.33502","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303142","reference_id":"2303142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303142"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-34/","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-38/","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909298","reference_id":"show_bug.cgi?id=1909298","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-06T19:11:59Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1909298"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7525"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xyqa-esey-73e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36118?format=json","vulnerability_id":"VCID-z6kw-szww-7feq","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7529","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31421","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31633","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31947","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31889","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31861","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3183","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31849","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31853","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31892","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7519"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7521"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7522"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7524"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7525"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7526"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7527"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303146","reference_id":"2303146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303146"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-34"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-34/","reference_id":"mfsa2024-34","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-34/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-38"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-38/","reference_id":"mfsa2024-38","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-38/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1903187","reference_id":"show_bug.cgi?id=1903187","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T13:32:01Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1903187"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"},{"reference_url":"https://usn.ubuntu.com/6995-1/","reference_id":"USN-6995-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6995-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7529"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z6kw-szww-7feq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36117?format=json","vulnerability_id":"VCID-zveb-b3t7-7yfg","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7528.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7528","reference_id":"","reference_type":"","scores":[{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46862","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46857","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4692","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46917","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46866","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4685","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.4686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46841","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7528"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303145","reference_id":"2303145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2303145"},{"reference_url":"https://security.gentoo.org/glsa/202412-04","reference_id":"GLSA-202412-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-04"},{"reference_url":"https://security.gentoo.org/glsa/202412-06","reference_id":"GLSA-202412-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-06"},{"reference_url":"https://security.gentoo.org/glsa/202412-13","reference_id":"GLSA-202412-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-13"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-33"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-33/","reference_id":"mfsa2024-33","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-33/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-35"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-35/","reference_id":"mfsa2024-35","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-35/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2024-37"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2024-37/","reference_id":"mfsa2024-37","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2024-37/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5322","reference_id":"RHSA-2024:5322","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5322"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5323","reference_id":"RHSA-2024:5323","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5323"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5324","reference_id":"RHSA-2024:5324","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5325","reference_id":"RHSA-2024:5325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5326","reference_id":"RHSA-2024:5326","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5327","reference_id":"RHSA-2024:5327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5328","reference_id":"RHSA-2024:5328","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5328"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5329","reference_id":"RHSA-2024:5329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5391","reference_id":"RHSA-2024:5391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5392","reference_id":"RHSA-2024:5392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5393","reference_id":"RHSA-2024:5393","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5393"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5394","reference_id":"RHSA-2024:5394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5395","reference_id":"RHSA-2024:5395","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5395"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5396","reference_id":"RHSA-2024:5396","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5396"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5402","reference_id":"RHSA-2024:5402","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5402"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5527","reference_id":"RHSA-2024:5527","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5527"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5528","reference_id":"RHSA-2024:5528","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5528"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895951","reference_id":"show_bug.cgi?id=1895951","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-09T15:09:03Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1895951"},{"reference_url":"https://usn.ubuntu.com/6966-1/","reference_id":"USN-6966-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6966-1/"}],"fixed_packages":[],"aliases":["CVE-2024-7528"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zveb-b3t7-7yfg"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@115.14.0-1%3Farch=el9_4"}