Lookup for vulnerable packages by Package URL.

GET /api/packages/130066?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/130066?format=api",
    "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4?arch=1",
    "type": "rpm",
    "namespace": "redhat",
    "name": "firefox",
    "version": "1.5.0.5-0.el4",
    "qualifiers": {
        "arch": "1"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32082?format=api",
            "vulnerability_id": "VCID-1azv-247b-xufb",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88436",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88348",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88356",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88371",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88376",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88395",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88401",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88411",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88404",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88403",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88418",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88414",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8843",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03983",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88435",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2784"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118",
                    "reference_id": "1618118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784",
                    "reference_id": "CVE-2006-2784",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-36",
                    "reference_id": "mfsa2006-36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-36"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2784"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1azv-247b-xufb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36773?format=api",
            "vulnerability_id": "VCID-1bwt-pf55-7ubd",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3808.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3808.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84922",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84791",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84806",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84826",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84827",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8485",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84875",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84873",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84867",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84888",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84886",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84912",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3808"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168",
                    "reference_id": "1618168",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808",
                    "reference_id": "CVE-2006-3808",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-52",
                    "reference_id": "mfsa2006-52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-52"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/361-1/",
                    "reference_id": "USN-361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/361-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3808"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1bwt-pf55-7ubd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88860?format=api",
            "vulnerability_id": "VCID-2bqp-adeh-7kck",
            "summary": "security flaw",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2788.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2788.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92216",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92223",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92229",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92246",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92252",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92261",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9226",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92262",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92267",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08288",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92263",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2788"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122",
                    "reference_id": "1618122",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/361-1/",
                    "reference_id": "USN-361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/361-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2788"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2bqp-adeh-7kck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36766?format=api",
            "vulnerability_id": "VCID-358q-cakg-h7h4",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96159",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96104",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96111",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96118",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96134",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96137",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9614",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96141",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9615",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96154",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96155",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.24704",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96158",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3803"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163",
                    "reference_id": "1618163",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803",
                    "reference_id": "CVE-2006-3803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-48",
                    "reference_id": "mfsa2006-48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-48"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3803"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-358q-cakg-h7h4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36777?format=api",
            "vulnerability_id": "VCID-72wd-b7rj-3fda",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3810.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3810.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94272",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94207",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94217",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94229",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94231",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9424",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94244",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94248",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94263",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94269",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.1364",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94273",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3810"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170",
                    "reference_id": "1618170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810",
                    "reference_id": "CVE-2006-3810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-54",
                    "reference_id": "mfsa2006-54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-54"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3810"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-72wd-b7rj-3fda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36764?format=api",
            "vulnerability_id": "VCID-8ffc-g2p2-xfax",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3801.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3801.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9647",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96418",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96425",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96429",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96432",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96441",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96444",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96452",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96458",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96463",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96465",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96466",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.27761",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96468",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3801"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161",
                    "reference_id": "1618161",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801",
                    "reference_id": "CVE-2006-3801",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-44",
                    "reference_id": "mfsa2006-44",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-44"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3801"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ffc-g2p2-xfax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36761?format=api",
            "vulnerability_id": "VCID-9u64-4cr7-w3e1",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3677.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3677.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98574",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98569",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9857",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98572",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98573",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98557",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98559",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98561",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.67298",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98563",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.76758",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98939",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.76758",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98941",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.76758",
                            "scoring_system": "epss",
                            "scoring_elements": "0.98943",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3677"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153",
                    "reference_id": "1618153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677",
                    "reference_id": "CVE-2006-3677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2082.html",
                    "reference_id": "CVE-2006-3677",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2082.html"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16300.rb",
                    "reference_id": "CVE-2006-3677;OSVDB-27559",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16300.rb"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9946.rb",
                    "reference_id": "CVE-2006-3677;OSVDB-27559",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9946.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-45",
                    "reference_id": "mfsa2006-45",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-45"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3677"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9u64-4cr7-w3e1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32080?format=api",
            "vulnerability_id": "VCID-bj2j-3fjg-yyhr",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80765",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80629",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80637",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80659",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80655",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80682",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80692",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80708",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80695",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80687",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80721",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80722",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80725",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80747",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01435",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80752",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2782"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116",
                    "reference_id": "1618116",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782",
                    "reference_id": "CVE-2006-2782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-41",
                    "reference_id": "mfsa2006-41",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-41"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2782"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bj2j-3fjg-yyhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32076?format=api",
            "vulnerability_id": "VCID-cggq-6c2f-1qf4",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95965",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9591",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95918",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95926",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9593",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95939",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95941",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95945",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95947",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95958",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95962",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95964",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2778"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113",
                    "reference_id": "1618113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778",
                    "reference_id": "CVE-2006-2778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-38",
                    "reference_id": "mfsa2006-38",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-38"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2778"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cggq-6c2f-1qf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36770?format=api",
            "vulnerability_id": "VCID-dvd1-3gbf-d3gw",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96387",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96335",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96343",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96347",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96352",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9636",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96363",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96368",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96367",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9637",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96378",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96382",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96384",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96385",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.27008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96386",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3806"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166",
                    "reference_id": "1618166",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806",
                    "reference_id": "CVE-2006-3806",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50",
                    "reference_id": "mfsa2006-50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/361-1/",
                    "reference_id": "USN-361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/361-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3806"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvd1-3gbf-d3gw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32079?format=api",
            "vulnerability_id": "VCID-fsff-rm4y-wudc",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96345",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96288",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96296",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96304",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96318",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96325",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96336",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96341",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96342",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96343",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96344",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2780"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115",
                    "reference_id": "1618115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780",
                    "reference_id": "CVE-2006-2780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32",
                    "reference_id": "mfsa2006-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2780"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsff-rm4y-wudc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36776?format=api",
            "vulnerability_id": "VCID-fxyr-h69x-fybu",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3809.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3809.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86532",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86425",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86436",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86455",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86474",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86484",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86499",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86496",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86491",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86506",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86512",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86504",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86523",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02964",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86533",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3809"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169",
                    "reference_id": "1618169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809",
                    "reference_id": "CVE-2006-3809",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-53",
                    "reference_id": "mfsa2006-53",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-53"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/361-1/",
                    "reference_id": "USN-361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/361-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3809"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fxyr-h69x-fybu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32081?format=api",
            "vulnerability_id": "VCID-gs89-ejt1-q7db",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89714",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89645",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89647",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89662",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89681",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89694",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89693",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89686",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89702",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89703",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89697",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89713",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89715",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2783"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117",
                    "reference_id": "1618117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783",
                    "reference_id": "CVE-2006-2783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-42",
                    "reference_id": "mfsa2006-42",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-42"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2783"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs89-ejt1-q7db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32085?format=api",
            "vulnerability_id": "VCID-kbyn-rze5-2qeg",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92704",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92655",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92668",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92678",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92689",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92688",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92687",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92701",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92705",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92708",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2787"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121",
                    "reference_id": "1618121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787",
                    "reference_id": "CVE-2006-2787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-31",
                    "reference_id": "mfsa2006-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2787"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbyn-rze5-2qeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36758?format=api",
            "vulnerability_id": "VCID-nkzt-x77d-8qb3",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3113.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3113.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3113",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96439",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96388",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96395",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.964",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96403",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96412",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96415",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9642",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96424",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96431",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96435",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96436",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.2749",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96438",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3113"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135",
                    "reference_id": "1618135",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113",
                    "reference_id": "CVE-2006-3113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-46",
                    "reference_id": "mfsa2006-46",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-46"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3113"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nkzt-x77d-8qb3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32083?format=api",
            "vulnerability_id": "VCID-nnxw-14g9-77da",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83795",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83654",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83667",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83681",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83684",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83707",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83714",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8373",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83724",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83719",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83754",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83755",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83779",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83787",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2785"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119",
                    "reference_id": "1618119",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785",
                    "reference_id": "CVE-2006-2785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-34",
                    "reference_id": "mfsa2006-34",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-34"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2785"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nnxw-14g9-77da"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36779?format=api",
            "vulnerability_id": "VCID-pyqg-v477-auex",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3811.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3811.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95335",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95276",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95288",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95293",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95298",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95306",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95309",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95314",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95316",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95323",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95327",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9533",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95331",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.18952",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95333",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3811"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171",
                    "reference_id": "1618171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811",
                    "reference_id": "CVE-2006-3811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-55",
                    "reference_id": "mfsa2006-55",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-55"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/361-1/",
                    "reference_id": "USN-361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/361-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3811"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyqg-v477-auex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36768?format=api",
            "vulnerability_id": "VCID-scb8-77mr-zkap",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95926",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9587",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95878",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95886",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9589",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95902",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95905",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95904",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95906",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95918",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95923",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23003",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95925",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3805"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165",
                    "reference_id": "1618165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805",
                    "reference_id": "CVE-2006-3805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50",
                    "reference_id": "mfsa2006-50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/361-1/",
                    "reference_id": "USN-361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/361-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3805"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-scb8-77mr-zkap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32084?format=api",
            "vulnerability_id": "VCID-t5kr-v1tx-5kdy",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85224",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85113",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85131",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85135",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85164",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85179",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85176",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85194",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85195",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85218",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85227",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2786"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120",
                    "reference_id": "1618120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786",
                    "reference_id": "CVE-2006-2786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-33",
                    "reference_id": "mfsa2006-33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-33"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2786"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t5kr-v1tx-5kdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32077?format=api",
            "vulnerability_id": "VCID-ucgx-bfkb-4kg5",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95967",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95914",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95922",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9593",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95934",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95949",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95951",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95962",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95968",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2779"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114",
                    "reference_id": "1618114",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779",
                    "reference_id": "CVE-2006-2779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32",
                    "reference_id": "mfsa2006-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2779"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucgx-bfkb-4kg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36765?format=api",
            "vulnerability_id": "VCID-vb9f-xdth-j7h3",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88076",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87984",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87994",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88008",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88013",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88033",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88039",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88049",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88042",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88055",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88054",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88072",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03764",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88077",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3802"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162",
                    "reference_id": "1618162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802",
                    "reference_id": "CVE-2006-3802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-47",
                    "reference_id": "mfsa2006-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3802"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vb9f-xdth-j7h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36780?format=api",
            "vulnerability_id": "VCID-vqeh-hhax-fqba",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94209",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94143",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94153",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94164",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94167",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94176",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9418",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94184",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.942",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94205",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.13369",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94208",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3812"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455",
                    "reference_id": "200455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812",
                    "reference_id": "CVE-2006-3812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-56",
                    "reference_id": "mfsa2006-56",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-56"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3812"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqeh-hhax-fqba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32074?format=api",
            "vulnerability_id": "VCID-xewd-ab7q-5bfs",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96776",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96729",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96741",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96745",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96753",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96756",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96759",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96765",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96769",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96771",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96773",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2776"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112",
                    "reference_id": "1618112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776",
                    "reference_id": "CVE-2006-2776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-37",
                    "reference_id": "mfsa2006-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-2776"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xewd-ab7q-5bfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36771?format=api",
            "vulnerability_id": "VCID-xn67-qscw-nuet",
            "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3807.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3807.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96576",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96525",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96534",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96539",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96542",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9655",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96552",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96555",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96564",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9657",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96572",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96573",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.28858",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96575",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3807"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167",
                    "reference_id": "1618167",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807",
                    "reference_id": "CVE-2006-3807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-02",
                    "reference_id": "GLSA-200608-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-03",
                    "reference_id": "GLSA-200608-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200608-04",
                    "reference_id": "GLSA-200608-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200608-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-51",
                    "reference_id": "mfsa2006-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-51"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608",
                    "reference_id": "RHSA-2006:0608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0608"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/327-1/",
                    "reference_id": "USN-327-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/327-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/329-1/",
                    "reference_id": "USN-329-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/329-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/350-1/",
                    "reference_id": "USN-350-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/350-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/361-1/",
                    "reference_id": "USN-361-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/361-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2006-3807"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xn67-qscw-nuet"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.5-0.el4%3Farch=1"
}