Lookup for vulnerable packages by Package URL.

GET /api/packages/128246?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/128246?format=api",
    "purl": "pkg:rpm/redhat/firefox@3.0.14-1?arch=el4",
    "type": "rpm",
    "namespace": "redhat",
    "name": "firefox",
    "version": "3.0.14-1",
    "qualifiers": {
        "arch": "el4"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52955?format=api",
            "vulnerability_id": "VCID-1bhg-rmd2-7uhe",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3070.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3070.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3070",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88503",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88435",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88443",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88458",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88461",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8848",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88486",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88497",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04029",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88489",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3070"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521686",
                    "reference_id": "521686",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070",
                    "reference_id": "CVE-2009-3070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47",
                    "reference_id": "mfsa2009-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3070"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1bhg-rmd2-7uhe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52982?format=api",
            "vulnerability_id": "VCID-1n9c-e6em-kbb6",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3077",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90185",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90124",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90127",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90139",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90143",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90159",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90173",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90167",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3077"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693",
                    "reference_id": "521693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521693"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077",
                    "reference_id": "CVE-2009-3077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-49",
                    "reference_id": "mfsa2009-49",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-49"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1431",
                    "reference_id": "RHSA-2009:1431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1432",
                    "reference_id": "RHSA-2009:1432",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1432"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/915-1/",
                    "reference_id": "USN-915-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/915-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3077"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1n9c-e6em-kbb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52977?format=api",
            "vulnerability_id": "VCID-3bf4-ms9e-x3dq",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95102",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95059",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95069",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9507",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95072",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95079",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95083",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95089",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9509",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95093",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3076"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692",
                    "reference_id": "521692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076",
                    "reference_id": "CVE-2009-3076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt",
                    "reference_id": "CVE-2009-3076;OSVDB-57977",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-48",
                    "reference_id": "mfsa2009-48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-48"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1431",
                    "reference_id": "RHSA-2009:1431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1432",
                    "reference_id": "RHSA-2009:1432",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1432"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3076"
            ],
            "risk_score": 0.4,
            "exploitability": "2.0",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3bf4-ms9e-x3dq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52966?format=api",
            "vulnerability_id": "VCID-3ydc-sd86-vkgg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3074.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3074.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3074",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91014",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9094",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90945",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90954",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90964",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90975",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90981",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90989",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9099",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3074"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521690",
                    "reference_id": "521690",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521690"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074",
                    "reference_id": "CVE-2009-3074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47",
                    "reference_id": "mfsa2009-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3074"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3ydc-sd86-vkgg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52960?format=api",
            "vulnerability_id": "VCID-4yz1-a716-kkh4",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3071.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3071.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86939",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8687",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8688",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86898",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86893",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86913",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86921",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86934",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86929",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86924",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3071"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521687",
                    "reference_id": "521687",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071",
                    "reference_id": "CVE-2009-3071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47",
                    "reference_id": "mfsa2009-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3071"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz1-a716-kkh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52970?format=api",
            "vulnerability_id": "VCID-jwsm-57gb-jkb4",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3075",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91051",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91018",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91027",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90976",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90981",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9099",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91001",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06395",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91013",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3075"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691",
                    "reference_id": "521691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521691"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075",
                    "reference_id": "CVE-2009-3075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47",
                    "reference_id": "mfsa2009-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-07",
                    "reference_id": "mfsa2010-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1431",
                    "reference_id": "RHSA-2009:1431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1432",
                    "reference_id": "RHSA-2009:1432",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1432"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/915-1/",
                    "reference_id": "USN-915-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/915-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3075"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jwsm-57gb-jkb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52989?format=api",
            "vulnerability_id": "VCID-q4zw-qbrc-p3bf",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3079.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3079.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81233",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81133",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81141",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81163",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81191",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81197",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81217",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81203",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0151",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81195",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3079"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521695",
                    "reference_id": "521695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079",
                    "reference_id": "CVE-2009-3079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-51",
                    "reference_id": "mfsa2009-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-51"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3079"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4zw-qbrc-p3bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52933?format=api",
            "vulnerability_id": "VCID-vbtt-wzmx-f3bf",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9415",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94092",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94102",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94113",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94116",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94125",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94129",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94134",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.13196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94133",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2654"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521311",
                    "reference_id": "521311",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521311"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654",
                    "reference_id": "CVE-2009-2654",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html",
                    "reference_id": "CVE-2009-2654;OSVDB-56717",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/35803/info",
                    "reference_id": "CVE-2009-2654;OSVDB-56717",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/35803/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-44",
                    "reference_id": "mfsa2009-44",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-44"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1431",
                    "reference_id": "RHSA-2009:1431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1432",
                    "reference_id": "RHSA-2009:1432",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1432"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/811-1/",
                    "reference_id": "USN-811-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/811-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-2654"
            ],
            "risk_score": 0.2,
            "exploitability": "2.0",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbtt-wzmx-f3bf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52962?format=api",
            "vulnerability_id": "VCID-wqza-9p8v-4kek",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3072",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89447",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89436",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89431",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89392",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89396",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89406",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89408",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89425",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89429",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89438",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3072"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688",
                    "reference_id": "521688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521688"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072",
                    "reference_id": "CVE-2009-3072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47",
                    "reference_id": "mfsa2009-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-07",
                    "reference_id": "mfsa2010-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1431",
                    "reference_id": "RHSA-2009:1431",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1431"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1432",
                    "reference_id": "RHSA-2009:1432",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1432"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/915-1/",
                    "reference_id": "USN-915-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/915-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3072"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqza-9p8v-4kek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52985?format=api",
            "vulnerability_id": "VCID-x2fp-9shs-2ucs",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3078.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3078.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3078",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82451",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82344",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82359",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82376",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82371",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82399",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82407",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82425",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82422",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01724",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82416",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3078"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=521694",
                    "reference_id": "521694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=521694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078",
                    "reference_id": "CVE-2009-3078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-50",
                    "reference_id": "mfsa2009-50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-50"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2009:1430",
                    "reference_id": "RHSA-2009:1430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2009:1430"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/821-1/",
                    "reference_id": "USN-821-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/821-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2009-3078"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x2fp-9shs-2ucs"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@3.0.14-1%3Farch=el4"
}