Lookup for vulnerable packages by Package URL.

GET /api/packages/126048?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/126048?format=api",
    "purl": "pkg:rpm/redhat/firefox@10.0.4-1?arch=el6_2",
    "type": "rpm",
    "namespace": "redhat",
    "name": "firefox",
    "version": "10.0.4-1",
    "qualifiers": {
        "arch": "el6_2"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49228?format=api",
            "vulnerability_id": "VCID-1zkd-zp3h-eyfn",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3062",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85051",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84954",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84968",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84985",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8499",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85012",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85019",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85035",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85034",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8503",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3062"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815042",
                    "reference_id": "815042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062",
                    "reference_id": "CVE-2011-3062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-31",
                    "reference_id": "mfsa2012-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2011-3062"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zkd-zp3h-eyfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55184?format=api",
            "vulnerability_id": "VCID-7zwg-29p1-17ds",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72463",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72513",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72504",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0477"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815026",
                    "reference_id": "815026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815026"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477",
                    "reference_id": "CVE-2012-0477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-29",
                    "reference_id": "mfsa2012-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0477"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zwg-29p1-17ds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63587?format=api",
            "vulnerability_id": "VCID-8sq7-89sv-ykad",
            "summary": "Security research firm iDefense reported that researcher\nwushi of team509 discovered a memory corruption on Windows\nVista and Windows 7 systems with hardware acceleration disabled or using\nincompatible video drivers. This is created by using cairo-dwrite to attempt to\nrender fonts on an unsupported code path. This corruption causes a potentially\nexploitable crash on affected systems.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0472.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0472.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81218",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81227",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8125",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81249",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81277",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81289",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81281",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0472"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815022",
                    "reference_id": "815022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472",
                    "reference_id": "CVE-2012-0472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-25",
                    "reference_id": "mfsa2012-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0472"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8sq7-89sv-ykad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55148?format=api",
            "vulnerability_id": "VCID-9rkg-yu78-aybg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0468.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0468.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85257",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85178",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85196",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85198",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8522",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85228",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85243",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8524",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85236",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0468"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815000",
                    "reference_id": "815000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468",
                    "reference_id": "CVE-2012-0468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-20",
                    "reference_id": "mfsa2012-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0468"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9rkg-yu78-aybg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55145?format=api",
            "vulnerability_id": "VCID-9ynp-8r9e-v3hm",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0467.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0467.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0467",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85098",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85002",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85014",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85032",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85059",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85066",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85082",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8508",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02405",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85076",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0467"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815000",
                    "reference_id": "815000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467",
                    "reference_id": "CVE-2012-0467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-20",
                    "reference_id": "mfsa2012-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0467"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ynp-8r9e-v3hm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55157?format=api",
            "vulnerability_id": "VCID-c3tr-d7n7-zyhd",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0469.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0469.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93519",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93528",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93535",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94988",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94992",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94994",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94996",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95005",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94975",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94984",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0469"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815019",
                    "reference_id": "815019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469",
                    "reference_id": "CVE-2012-0469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-22",
                    "reference_id": "mfsa2012-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0469"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c3tr-d7n7-zyhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55171?format=api",
            "vulnerability_id": "VCID-gfdq-tc9r-cqhg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0474.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0474.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71704",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71624",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71631",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71649",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71621",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71661",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71672",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71696",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71679",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7166",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0474"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815024",
                    "reference_id": "815024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474",
                    "reference_id": "CVE-2012-0474",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-27",
                    "reference_id": "mfsa2012-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0474"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gfdq-tc9r-cqhg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55166?format=api",
            "vulnerability_id": "VCID-gw7m-z4bd-xkd3",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0473.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0473.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72313",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72227",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72233",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72253",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72229",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72266",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.723",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72284",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72271",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0473"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815023",
                    "reference_id": "815023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473",
                    "reference_id": "CVE-2012-0473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-26",
                    "reference_id": "mfsa2012-26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-26"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0473"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gw7m-z4bd-xkd3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55189?format=api",
            "vulnerability_id": "VCID-k66t-arjf-duhj",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0478.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0478.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73245",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73148",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73158",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73179",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73153",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73189",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73227",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73209",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0478"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815037",
                    "reference_id": "815037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478",
                    "reference_id": "CVE-2012-0478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-30",
                    "reference_id": "mfsa2012-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0478"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k66t-arjf-duhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55160?format=api",
            "vulnerability_id": "VCID-susy-jnsq-fqht",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0470.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0470.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90435",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90381",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90396",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.904",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90414",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90421",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90428",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9042",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0470"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815020",
                    "reference_id": "815020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470",
                    "reference_id": "CVE-2012-0470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-23",
                    "reference_id": "mfsa2012-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0470"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-susy-jnsq-fqht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55196?format=api",
            "vulnerability_id": "VCID-tg3e-uvm1-cbfu",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0479.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0479.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73643",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7355",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73559",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73582",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73591",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73604",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73626",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73608",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73599",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0479"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815044",
                    "reference_id": "815044",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815044"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479",
                    "reference_id": "CVE-2012-0479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-33",
                    "reference_id": "mfsa2012-33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-33"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0479"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tg3e-uvm1-cbfu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55162?format=api",
            "vulnerability_id": "VCID-wdt4-m7fr-q3hm",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0471.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0471.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72463",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72513",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72504",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0471"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815021",
                    "reference_id": "815021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471",
                    "reference_id": "CVE-2012-0471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-24",
                    "reference_id": "mfsa2012-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0471"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdt4-m7fr-q3hm"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@10.0.4-1%3Farch=el6_2"
}