{"url":"http://public2.vulnerablecode.io/api/packages/97572?format=json","purl":"pkg:rpm/redhat/thunderbird@102.5.0-2?arch=el8_6","type":"rpm","namespace":"redhat","name":"thunderbird","version":"102.5.0-2","qualifiers":{"arch":"el8_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47156?format=json","vulnerability_id":"VCID-1hak-cqnh-tqay","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45406.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45406","reference_id":"","reference_type":"","scores":[{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61898","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61919","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61914","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61891","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61903","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61847","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61866","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00419","scoring_system":"epss","scoring_elements":"0.61882","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143200","reference_id":"2143200","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143200"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791975","reference_id":"show_bug.cgi?id=1791975","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:46:39Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791975"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45406"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1hak-cqnh-tqay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47162?format=json","vulnerability_id":"VCID-7t2x-pksm-ubgy","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45416.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45416","reference_id":"","reference_type":"","scores":[{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40663","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40645","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40623","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40654","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40607","published_at":"2026-04-13T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41974","published_at":"2026-04-26T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4189","published_at":"2026-04-29T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.4198","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143240","reference_id":"2143240","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143240"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793676","reference_id":"show_bug.cgi?id=1793676","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:51:21Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1793676"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45416"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7t2x-pksm-ubgy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47163?format=json","vulnerability_id":"VCID-7vk4-9vwa-pbe9","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45418.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45418.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45418","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39222","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3931","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3926","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39315","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39331","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39343","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39286","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4047","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40566","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40553","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143241","reference_id":"2143241","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143241"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45418"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7vk4-9vwa-pbe9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47155?format=json","vulnerability_id":"VCID-8q1b-fdq4-aqha","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45405.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45405","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3914","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39222","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3922","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39194","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39198","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39191","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40449","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40368","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00188","scoring_system":"epss","scoring_elements":"0.40463","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143199","reference_id":"2143199","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143199"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791314","reference_id":"show_bug.cgi?id=1791314","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:10:58Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791314"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45405"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8q1b-fdq4-aqha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47160?format=json","vulnerability_id":"VCID-8s22-tw1u-7kbw","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45411.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45411.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45411","reference_id":"","reference_type":"","scores":[{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45147","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45163","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45158","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45144","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45192","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45199","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46994","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46945","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46983","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143204","reference_id":"2143204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143204"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311","reference_id":"show_bug.cgi?id=1790311","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:08:14Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790311"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45411"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8s22-tw1u-7kbw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47159?format=json","vulnerability_id":"VCID-an3w-wb6n-zuee","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45410.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45410.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45410","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35898","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36042","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35923","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35947","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35986","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35979","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.36073","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36769","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00162","scoring_system":"epss","scoring_elements":"0.36856","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143203","reference_id":"2143203","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143203"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658869","reference_id":"show_bug.cgi?id=1658869","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T14:35:51Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658869"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45410"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-an3w-wb6n-zuee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47157?format=json","vulnerability_id":"VCID-fpw1-j3wb-xfd5","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45408.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45408","reference_id":"","reference_type":"","scores":[{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38184","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38249","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.3834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38256","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38282","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38269","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0017","scoring_system":"epss","scoring_elements":"0.38222","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39471","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39554","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143201","reference_id":"2143201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143201"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45408"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpw1-j3wb-xfd5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47154?format=json","vulnerability_id":"VCID-mm7x-rfzg-uqfc","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45404.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45404.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45404","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38386","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3846","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38522","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38436","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38361","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38424","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38397","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39766","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39681","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39781","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143198","reference_id":"2143198","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143198"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790815","reference_id":"show_bug.cgi?id=1790815","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:14:24Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1790815"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45404"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mm7x-rfzg-uqfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47161?format=json","vulnerability_id":"VCID-uuxf-cyfq-p3e2","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45412.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45412","reference_id":"","reference_type":"","scores":[{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43671","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43748","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43703","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43734","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43715","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43712","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43727","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00212","scoring_system":"epss","scoring_elements":"0.43661","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45234","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143205","reference_id":"2143205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143205"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791029","reference_id":"show_bug.cgi?id=1791029","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T15:04:52Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1791029"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45412"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uuxf-cyfq-p3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47153?format=json","vulnerability_id":"VCID-y3v2-cyyc-yyep","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45403.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45403.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45403","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40493","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40497","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40534","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40513","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40502","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.4053","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41854","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143197","reference_id":"2143197","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143197"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1762078","reference_id":"show_bug.cgi?id=1762078","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T15:17:40Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1762078"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45403"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y3v2-cyyc-yyep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47158?format=json","vulnerability_id":"VCID-yc74-5kag-2bdn","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45409.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45409","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51261","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143202","reference_id":"2143202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143202"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1796901","reference_id":"show_bug.cgi?id=1796901","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:38:34Z/"}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1796901"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45409"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yc74-5kag-2bdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47165?format=json","vulnerability_id":"VCID-ydz6-761h-jbeq","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45421.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45421","reference_id":"","reference_type":"","scores":[{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49494","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49561","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.4954","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49523","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49528","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00262","scoring_system":"epss","scoring_elements":"0.49473","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51225","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51261","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143243","reference_id":"2143243","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143243"},{"reference_url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1767920%2C1789808%2C1794061","reference_id":"buglist.cgi?bug_id=1767920%2C1789808%2C1794061","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://bugzilla.mozilla.org/buglist.cgi?bug_id=1767920%2C1789808%2C1794061"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-47/","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-47/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-48/","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-48/"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://www.mozilla.org/security/advisories/mfsa2022-49/","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:14:39Z/"}],"url":"https://www.mozilla.org/security/advisories/mfsa2022-49/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45421"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydz6-761h-jbeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47164?format=json","vulnerability_id":"VCID-yuhg-jeet-cffp","summary":"Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45420.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45420.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45420","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34004","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34086","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.3402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34999","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34979","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143242","reference_id":"2143242","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2143242"},{"reference_url":"https://security.gentoo.org/glsa/202211-05","reference_id":"GLSA-202211-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-05"},{"reference_url":"https://security.gentoo.org/glsa/202211-06","reference_id":"GLSA-202211-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202211-06"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47","reference_id":"mfsa2022-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48","reference_id":"mfsa2022-48","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-48"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49","reference_id":"mfsa2022-49","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2022-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8543","reference_id":"RHSA-2022:8543","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8544","reference_id":"RHSA-2022:8544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8545","reference_id":"RHSA-2022:8545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8547","reference_id":"RHSA-2022:8547","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8547"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8548","reference_id":"RHSA-2022:8548","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8548"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8549","reference_id":"RHSA-2022:8549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8549"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8550","reference_id":"RHSA-2022:8550","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8550"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8552","reference_id":"RHSA-2022:8552","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8552"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8553","reference_id":"RHSA-2022:8553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8554","reference_id":"RHSA-2022:8554","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8554"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8555","reference_id":"RHSA-2022:8555","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8555"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8556","reference_id":"RHSA-2022:8556","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8556"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8561","reference_id":"RHSA-2022:8561","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8561"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8580","reference_id":"RHSA-2022:8580","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8979","reference_id":"RHSA-2022:8979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8980","reference_id":"RHSA-2022:8980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8980"},{"reference_url":"https://usn.ubuntu.com/5726-1/","reference_id":"USN-5726-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5726-1/"},{"reference_url":"https://usn.ubuntu.com/5824-1/","reference_id":"USN-5824-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5824-1/"}],"fixed_packages":[],"aliases":["CVE-2022-45420"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yuhg-jeet-cffp"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@102.5.0-2%3Farch=el8_6"}