Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@102.6.0-2?arch=el8_2
Typerpm
Namespaceredhat
Namethunderbird
Version102.6.0-2
Qualifiers
arch el8_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-362f-1bn1-mbg5
vulnerability_id VCID-362f-1bn1-mbg5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46882.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46882.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46882
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.5435
published_at 2026-04-08T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54398
published_at 2026-04-18T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54395
published_at 2026-04-16T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54355
published_at 2026-04-13T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54377
published_at 2026-04-12T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54394
published_at 2026-04-11T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54323
published_at 2026-04-04T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.54298
published_at 2026-04-07T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54345
published_at 2026-04-09T12:55:00Z
9
value 0.00312
scoring_system epss
scoring_elements 0.54293
published_at 2026-04-02T12:55:00Z
10
value 0.00312
scoring_system epss
scoring_elements 0.54379
published_at 2026-04-21T12:55:00Z
11
value 0.00332
scoring_system epss
scoring_elements 0.56037
published_at 2026-04-29T12:55:00Z
12
value 0.00332
scoring_system epss
scoring_elements 0.56062
published_at 2026-04-26T12:55:00Z
13
value 0.00332
scoring_system epss
scoring_elements 0.56041
published_at 2026-04-24T12:55:00Z
14
value 0.00385
scoring_system epss
scoring_elements 0.59718
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46882
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153467
reference_id 2153467
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153467
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-47
reference_id mfsa2022-47
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-47
13
reference_url https://www.mozilla.org/security/advisories/mfsa2022-47/
reference_id mfsa2022-47
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-47/
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
15
reference_url https://www.mozilla.org/security/advisories/mfsa2022-52/
reference_id mfsa2022-52
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-52/
16
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
17
reference_url https://www.mozilla.org/security/advisories/mfsa2022-53/
reference_id mfsa2022-53
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://www.mozilla.org/security/advisories/mfsa2022-53/
18
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
19
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
20
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
21
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
22
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
23
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
24
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
25
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
26
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
27
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
28
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
29
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
30
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
31
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
32
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
33
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
34
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1789371
reference_id show_bug.cgi?id=1789371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:51:08Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1789371
35
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
aliases CVE-2022-46882
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-362f-1bn1-mbg5
1
url VCID-e4nx-qfam-cfaj
vulnerability_id VCID-e4nx-qfam-cfaj
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54744
published_at 2026-04-18T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54742
published_at 2026-04-16T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54725
published_at 2026-04-21T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54704
published_at 2026-04-13T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54689
published_at 2026-04-02T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54711
published_at 2026-04-04T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54681
published_at 2026-04-07T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54733
published_at 2026-04-08T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54729
published_at 2026-04-09T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56513
published_at 2026-04-26T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56493
published_at 2026-04-29T12:55:00Z
11
value 0.00337
scoring_system epss
scoring_elements 0.56494
published_at 2026-04-24T12:55:00Z
12
value 0.00397
scoring_system epss
scoring_elements 0.60465
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46872
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
reference_id 2153441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153441
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
aliases CVE-2022-46872
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e4nx-qfam-cfaj
2
url VCID-fxnj-rr7h-ryb5
vulnerability_id VCID-fxnj-rr7h-ryb5
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46880.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46880.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46880
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39303
published_at 2026-04-21T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39366
published_at 2026-04-13T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39418
published_at 2026-04-16T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39389
published_at 2026-04-18T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39402
published_at 2026-04-02T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39426
published_at 2026-04-04T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.3934
published_at 2026-04-07T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39396
published_at 2026-04-08T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39413
published_at 2026-04-09T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39423
published_at 2026-04-11T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39384
published_at 2026-04-12T12:55:00Z
11
value 0.00189
scoring_system epss
scoring_elements 0.40612
published_at 2026-04-26T12:55:00Z
12
value 0.00189
scoring_system epss
scoring_elements 0.40529
published_at 2026-04-29T12:55:00Z
13
value 0.00189
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-24T12:55:00Z
14
value 0.00223
scoring_system epss
scoring_elements 0.44752
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46880
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153463
reference_id 2153463
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153463
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-40
reference_id mfsa2022-40
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-40
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
aliases CVE-2022-46880
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fxnj-rr7h-ryb5
3
url VCID-hp32-swmr-qqdy
vulnerability_id VCID-hp32-swmr-qqdy
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
reference_id
reference_type
scores
0
value 0.00352
scoring_system epss
scoring_elements 0.5765
published_at 2026-04-21T12:55:00Z
1
value 0.00352
scoring_system epss
scoring_elements 0.57646
published_at 2026-04-13T12:55:00Z
2
value 0.00352
scoring_system epss
scoring_elements 0.57676
published_at 2026-04-16T12:55:00Z
3
value 0.00352
scoring_system epss
scoring_elements 0.57671
published_at 2026-04-18T12:55:00Z
4
value 0.00352
scoring_system epss
scoring_elements 0.57617
published_at 2026-04-02T12:55:00Z
5
value 0.00352
scoring_system epss
scoring_elements 0.57638
published_at 2026-04-04T12:55:00Z
6
value 0.00352
scoring_system epss
scoring_elements 0.57614
published_at 2026-04-07T12:55:00Z
7
value 0.00352
scoring_system epss
scoring_elements 0.57668
published_at 2026-04-08T12:55:00Z
8
value 0.00352
scoring_system epss
scoring_elements 0.57673
published_at 2026-04-09T12:55:00Z
9
value 0.00352
scoring_system epss
scoring_elements 0.57687
published_at 2026-04-11T12:55:00Z
10
value 0.00352
scoring_system epss
scoring_elements 0.57666
published_at 2026-04-12T12:55:00Z
11
value 0.00375
scoring_system epss
scoring_elements 0.59163
published_at 2026-04-26T12:55:00Z
12
value 0.00375
scoring_system epss
scoring_elements 0.59148
published_at 2026-04-29T12:55:00Z
13
value 0.00375
scoring_system epss
scoring_elements 0.59144
published_at 2026-04-24T12:55:00Z
14
value 0.00458
scoring_system epss
scoring_elements 0.63989
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46878
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
reference_id 2153454
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153454
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
aliases CVE-2022-46878
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp32-swmr-qqdy
4
url VCID-q494-zvyn-quge
vulnerability_id VCID-q494-zvyn-quge
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46881.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46881.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46881
reference_id
reference_type
scores
0
value 0.0024
scoring_system epss
scoring_elements 0.47322
published_at 2026-04-21T12:55:00Z
1
value 0.0024
scoring_system epss
scoring_elements 0.4732
published_at 2026-04-13T12:55:00Z
2
value 0.0024
scoring_system epss
scoring_elements 0.47378
published_at 2026-04-16T12:55:00Z
3
value 0.0024
scoring_system epss
scoring_elements 0.47372
published_at 2026-04-18T12:55:00Z
4
value 0.0024
scoring_system epss
scoring_elements 0.47296
published_at 2026-04-02T12:55:00Z
5
value 0.0024
scoring_system epss
scoring_elements 0.47316
published_at 2026-04-04T12:55:00Z
6
value 0.0024
scoring_system epss
scoring_elements 0.47263
published_at 2026-04-07T12:55:00Z
7
value 0.0024
scoring_system epss
scoring_elements 0.47318
published_at 2026-04-08T12:55:00Z
8
value 0.0024
scoring_system epss
scoring_elements 0.47315
published_at 2026-04-09T12:55:00Z
9
value 0.0024
scoring_system epss
scoring_elements 0.47339
published_at 2026-04-11T12:55:00Z
10
value 0.0024
scoring_system epss
scoring_elements 0.47313
published_at 2026-04-12T12:55:00Z
11
value 0.00256
scoring_system epss
scoring_elements 0.48992
published_at 2026-04-26T12:55:00Z
12
value 0.00256
scoring_system epss
scoring_elements 0.48946
published_at 2026-04-29T12:55:00Z
13
value 0.00256
scoring_system epss
scoring_elements 0.48983
published_at 2026-04-24T12:55:00Z
14
value 0.00269
scoring_system epss
scoring_elements 0.50266
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46881
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153466
reference_id 2153466
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153466
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-44
reference_id mfsa2022-44
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-44
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
reference_id mfsa2022-53
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-53
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
aliases CVE-2022-46881
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q494-zvyn-quge
5
url VCID-x4b1-wug7-wuex
vulnerability_id VCID-x4b1-wug7-wuex
summary If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targeting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45414.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45414
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51171
published_at 2026-05-05T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51284
published_at 2026-04-13T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51324
published_at 2026-04-16T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51332
published_at 2026-04-18T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.5131
published_at 2026-04-21T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51258
published_at 2026-04-24T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51229
published_at 2026-04-29T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51239
published_at 2026-04-02T12:55:00Z
8
value 0.00279
scoring_system epss
scoring_elements 0.51265
published_at 2026-04-26T12:55:00Z
9
value 0.00279
scoring_system epss
scoring_elements 0.51223
published_at 2026-04-07T12:55:00Z
10
value 0.00279
scoring_system epss
scoring_elements 0.51279
published_at 2026-04-08T12:55:00Z
11
value 0.00279
scoring_system epss
scoring_elements 0.51275
published_at 2026-04-09T12:55:00Z
12
value 0.00279
scoring_system epss
scoring_elements 0.51319
published_at 2026-04-11T12:55:00Z
13
value 0.00279
scoring_system epss
scoring_elements 0.51298
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45414
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2149868
reference_id 2149868
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2149868
11
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-50
reference_id mfsa2022-50
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-50
12
reference_url https://www.mozilla.org/security/advisories/mfsa2022-50/
reference_id mfsa2022-50
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:54:57Z/
url https://www.mozilla.org/security/advisories/mfsa2022-50/
13
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
14
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
15
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
16
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
17
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
18
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
19
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
20
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
21
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1788096
reference_id show_bug.cgi?id=1788096
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:54:57Z/
url https://bugzilla.mozilla.org/show_bug.cgi?id=1788096
22
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
aliases CVE-2022-45414
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4b1-wug7-wuex
6
url VCID-yxy6-s185-myc9
vulnerability_id VCID-yxy6-s185-myc9
summary Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59387
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59366
published_at 2026-04-13T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59399
published_at 2026-04-16T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59405
published_at 2026-04-18T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.5933
published_at 2026-04-02T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59353
published_at 2026-04-04T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59318
published_at 2026-04-07T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.59368
published_at 2026-04-08T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59382
published_at 2026-04-09T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59401
published_at 2026-04-11T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59384
published_at 2026-04-12T12:55:00Z
11
value 0.00403
scoring_system epss
scoring_elements 0.60892
published_at 2026-04-26T12:55:00Z
12
value 0.00403
scoring_system epss
scoring_elements 0.60885
published_at 2026-04-29T12:55:00Z
13
value 0.00403
scoring_system epss
scoring_elements 0.6088
published_at 2026-04-24T12:55:00Z
14
value 0.00467
scoring_system epss
scoring_elements 0.64499
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46874
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
reference_id 2153449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153449
10
reference_url https://security.gentoo.org/glsa/202305-06
reference_id GLSA-202305-06
reference_type
scores
url https://security.gentoo.org/glsa/202305-06
11
reference_url https://security.gentoo.org/glsa/202305-13
reference_id GLSA-202305-13
reference_type
scores
url https://security.gentoo.org/glsa/202305-13
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
reference_id mfsa2022-51
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-51
13
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
reference_id mfsa2022-52
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-52
14
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
reference_id mfsa2022-54
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2022-54
15
reference_url https://access.redhat.com/errata/RHSA-2022:9065
reference_id RHSA-2022:9065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9065
16
reference_url https://access.redhat.com/errata/RHSA-2022:9066
reference_id RHSA-2022:9066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9066
17
reference_url https://access.redhat.com/errata/RHSA-2022:9067
reference_id RHSA-2022:9067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9067
18
reference_url https://access.redhat.com/errata/RHSA-2022:9068
reference_id RHSA-2022:9068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9068
19
reference_url https://access.redhat.com/errata/RHSA-2022:9069
reference_id RHSA-2022:9069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9069
20
reference_url https://access.redhat.com/errata/RHSA-2022:9070
reference_id RHSA-2022:9070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9070
21
reference_url https://access.redhat.com/errata/RHSA-2022:9071
reference_id RHSA-2022:9071
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9071
22
reference_url https://access.redhat.com/errata/RHSA-2022:9072
reference_id RHSA-2022:9072
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9072
23
reference_url https://access.redhat.com/errata/RHSA-2022:9074
reference_id RHSA-2022:9074
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9074
24
reference_url https://access.redhat.com/errata/RHSA-2022:9075
reference_id RHSA-2022:9075
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9075
25
reference_url https://access.redhat.com/errata/RHSA-2022:9076
reference_id RHSA-2022:9076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9076
26
reference_url https://access.redhat.com/errata/RHSA-2022:9077
reference_id RHSA-2022:9077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9077
27
reference_url https://access.redhat.com/errata/RHSA-2022:9078
reference_id RHSA-2022:9078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9078
28
reference_url https://access.redhat.com/errata/RHSA-2022:9079
reference_id RHSA-2022:9079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9079
29
reference_url https://access.redhat.com/errata/RHSA-2022:9080
reference_id RHSA-2022:9080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9080
30
reference_url https://access.redhat.com/errata/RHSA-2022:9081
reference_id RHSA-2022:9081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:9081
31
reference_url https://usn.ubuntu.com/5782-1/
reference_id USN-5782-1
reference_type
scores
url https://usn.ubuntu.com/5782-1/
32
reference_url https://usn.ubuntu.com/5824-1/
reference_id USN-5824-1
reference_type
scores
url https://usn.ubuntu.com/5824-1/
fixed_packages
aliases CVE-2022-46874
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yxy6-s185-myc9
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@102.6.0-2%3Farch=el8_2