Lookup for vulnerable packages by Package URL.

GET /api/packages/129414?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/129414?format=api",
    "purl": "pkg:rpm/redhat/thunderbird@1.5.0.12-8?arch=el5",
    "type": "rpm",
    "namespace": "redhat",
    "name": "thunderbird",
    "version": "1.5.0.12-8",
    "qualifiers": {
        "arch": "el5"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48634?format=api",
            "vulnerability_id": "VCID-8r7s-6f5v-67f7",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8622",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86109",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86119",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86135",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8618",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86178",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86174",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86191",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86188",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8621",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0420"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431750",
                    "reference_id": "431750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420",
                    "reference_id": "CVE-2008-0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-07",
                    "reference_id": "mfsa2008-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0420"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8r7s-6f5v-67f7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48635?format=api",
            "vulnerability_id": "VCID-9y9r-1gqw-6fgk",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91719",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91659",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91667",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91673",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91694",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91701",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91704",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91707",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91703",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91724",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91718",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91723",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91721",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0591"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431751",
                    "reference_id": "431751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431751"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591",
                    "reference_id": "CVE-2008-0591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-08",
                    "reference_id": "mfsa2008-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0591"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9y9r-1gqw-6fgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48626?format=api",
            "vulnerability_id": "VCID-ea68-57qy-1kax",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83595",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83622",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83624",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83648",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83655",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83672",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83665",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83695",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83696",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83721",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83728",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0415"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431739",
                    "reference_id": "431739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415",
                    "reference_id": "CVE-2008-0415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-03",
                    "reference_id": "mfsa2008-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0415"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ea68-57qy-1kax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48613?format=api",
            "vulnerability_id": "VCID-fzxh-1prr-c7et",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96676",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96686",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96689",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96693",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96701",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96702",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96705",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96708",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96714",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96718",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96721",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9672",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96722",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0304"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=435123",
                    "reference_id": "435123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435123"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304",
                    "reference_id": "CVE-2008-0304",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-12",
                    "reference_id": "mfsa2008-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0304"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fzxh-1prr-c7et"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48633?format=api",
            "vulnerability_id": "VCID-h91r-2kyx-v7f8",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95296",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9524",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95255",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9526",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95275",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95286",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95291",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95293",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95294",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0419"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431749",
                    "reference_id": "431749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431749"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419",
                    "reference_id": "CVE-2008-0419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-06",
                    "reference_id": "mfsa2008-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0419"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h91r-2kyx-v7f8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48631?format=api",
            "vulnerability_id": "VCID-pkeq-w64f-5bda",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0418",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97265",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97222",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97228",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97233",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97234",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97244",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97257",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97259",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97263",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0418"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431748",
                    "reference_id": "431748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418",
                    "reference_id": "CVE-2008-0418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt",
                    "reference_id": "CVE-2008-0418;OSVDB-41187",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/27406/info",
                    "reference_id": "CVE-2008-0418;OSVDB-41187",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/27406/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-05",
                    "reference_id": "mfsa2008-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0418"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkeq-w64f-5bda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48621?format=api",
            "vulnerability_id": "VCID-pr7b-3h2r-aubm",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0413",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92138",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92094",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92101",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92112",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9213",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92131",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92137",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92134",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92135",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0413"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431733",
                    "reference_id": "431733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413",
                    "reference_id": "CVE-2008-0413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01",
                    "reference_id": "mfsa2008-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0413"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pr7b-3h2r-aubm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48639?format=api",
            "vulnerability_id": "VCID-vrc7-3rm4-b3fk",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78037",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77898",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77915",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77942",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77946",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77973",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77958",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77991",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7799",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77983",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78016",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78023",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0593"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431756",
                    "reference_id": "431756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431756"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593",
                    "reference_id": "CVE-2008-0593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-10",
                    "reference_id": "mfsa2008-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0593"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vrc7-3rm4-b3fk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48615?format=api",
            "vulnerability_id": "VCID-vvtb-nt5x-3yh9",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93663",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93595",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93605",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93614",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93624",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93632",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93633",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93651",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93657",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93662",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93666",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93665",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0412"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431732",
                    "reference_id": "431732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412",
                    "reference_id": "CVE-2008-0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01",
                    "reference_id": "mfsa2008-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0412"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvtb-nt5x-3yh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48638?format=api",
            "vulnerability_id": "VCID-xv3s-67bq-1ugj",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87456",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87376",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87391",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87409",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87417",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8742",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87435",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87437",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87432",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87449",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87455",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0592"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431752",
                    "reference_id": "431752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431752"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592",
                    "reference_id": "CVE-2008-0592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-09",
                    "reference_id": "mfsa2008-09",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2008-0592"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xv3s-67bq-1ugj"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@1.5.0.12-8%3Farch=el5"
}