{"url":"http://public2.vulnerablecode.io/api/packages/95851?format=json","purl":"pkg:rpm/redhat/firefox@102.13.0-2?arch=el8_1","type":"rpm","namespace":"redhat","name":"firefox","version":"102.13.0-2","qualifiers":{"arch":"el8_1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51443?format=json","vulnerability_id":"VCID-52ha-qvpu-ruc8","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37208.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37208","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13673","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13783","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13867","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13919","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13876","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13791","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13701","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13695","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1398","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219750","reference_id":"2219750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219750"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837675","reference_id":"show_bug.cgi?id=1837675","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-20T21:34:29Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1837675"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[],"aliases":["CVE-2023-37208"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52ha-qvpu-ruc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51441?format=json","vulnerability_id":"VCID-ch3v-nq5w-3fg4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37202.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37202","reference_id":"","reference_type":"","scores":[{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.69866","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00611","scoring_system":"epss","scoring_elements":"0.6987","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71128","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.7117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71183","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71192","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71221","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00663","scoring_system":"epss","scoring_elements":"0.71228","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219748","reference_id":"2219748","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219748"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1834711","reference_id":"show_bug.cgi?id=1834711","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T14:17:49Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1834711"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"},{"reference_url":"https://usn.ubuntu.com/6227-1/","reference_id":"USN-6227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6227-1/"}],"fixed_packages":[],"aliases":["CVE-2023-37202"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ch3v-nq5w-3fg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51440?format=json","vulnerability_id":"VCID-gs3s-s4zk-fyh4","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37201.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37201","reference_id":"","reference_type":"","scores":[{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72324","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72279","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72333","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00711","scoring_system":"epss","scoring_elements":"0.72329","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73191","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73241","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73266","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73239","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00755","scoring_system":"epss","scoring_elements":"0.73291","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219747","reference_id":"2219747","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219747"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826002","reference_id":"show_bug.cgi?id=1826002","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-21T14:30:36Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1826002"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[],"aliases":["CVE-2023-37201"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs3s-s4zk-fyh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51442?format=json","vulnerability_id":"VCID-mwj3-wa1g-buay","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37207","reference_id":"","reference_type":"","scores":[{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61568","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61571","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00414","scoring_system":"epss","scoring_elements":"0.61566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66039","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66007","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66056","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66068","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66074","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66043","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66078","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00502","scoring_system":"epss","scoring_elements":"0.66093","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219749","reference_id":"2219749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219749"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1816287","reference_id":"show_bug.cgi?id=1816287","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-20T21:36:31Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1816287"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"}],"fixed_packages":[],"aliases":["CVE-2023-37207"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mwj3-wa1g-buay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51444?format=json","vulnerability_id":"VCID-vmm4-dq3p-kqhu","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37211","reference_id":"","reference_type":"","scores":[{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00468","scoring_system":"epss","scoring_elements":"0.64519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68216","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68282","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68301","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68261","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68295","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0056","scoring_system":"epss","scoring_elements":"0.68241","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-37211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219751","reference_id":"2219751","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2219751"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450","reference_id":"buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1832306%2C1834862%2C1835886%2C1836550%2C1837450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5450","reference_id":"dsa-5450","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.debian.org/security/2023/dsa-5450"},{"reference_url":"https://www.debian.org/security/2023/dsa-5451","reference_id":"dsa-5451","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.debian.org/security/2023/dsa-5451"},{"reference_url":"https://security.gentoo.org/glsa/202402-25","reference_id":"GLSA-202402-25","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-25"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-22"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-22/","reference_id":"mfsa2023-22","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-22/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-23"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-23/","reference_id":"mfsa2023-23","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-23/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2023-24"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2023-24/","reference_id":"mfsa2023-24","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2023-24/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html","reference_id":"msg00006.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00006.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html","reference_id":"msg00015.html","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-20T21:32:28Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/07/msg00015.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4062","reference_id":"RHSA-2023:4062","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4062"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4063","reference_id":"RHSA-2023:4063","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4063"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4064","reference_id":"RHSA-2023:4064","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4065","reference_id":"RHSA-2023:4065","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4065"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4066","reference_id":"RHSA-2023:4066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4067","reference_id":"RHSA-2023:4067","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4067"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4068","reference_id":"RHSA-2023:4068","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4068"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4069","reference_id":"RHSA-2023:4069","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4069"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4070","reference_id":"RHSA-2023:4070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4071","reference_id":"RHSA-2023:4071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4072","reference_id":"RHSA-2023:4072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4073","reference_id":"RHSA-2023:4073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4074","reference_id":"RHSA-2023:4074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4075","reference_id":"RHSA-2023:4075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4076","reference_id":"RHSA-2023:4076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4079","reference_id":"RHSA-2023:4079","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4079"},{"reference_url":"https://usn.ubuntu.com/6201-1/","reference_id":"USN-6201-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6201-1/"},{"reference_url":"https://usn.ubuntu.com/6214-1/","reference_id":"USN-6214-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6214-1/"},{"reference_url":"https://usn.ubuntu.com/6227-1/","reference_id":"USN-6227-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6227-1/"}],"fixed_packages":[],"aliases":["CVE-2023-37211"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmm4-dq3p-kqhu"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@102.13.0-2%3Farch=el8_1"}