Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/130066?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/130066?format=api", "purl": "pkg:rpm/redhat/firefox@1.5.0.5-0.el4?arch=1", "type": "rpm", "namespace": "redhat", "name": "firefox", "version": "1.5.0.5-0.el4", "qualifiers": { "arch": "1" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32082?format=api", "vulnerability_id": "VCID-1azv-247b-xufb", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2784", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88436", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88348", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88356", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88371", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88376", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88395", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88411", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88404", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88403", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88418", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88414", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.8843", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03983", "scoring_system": "epss", "scoring_elements": "0.88435", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2784" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118", "reference_id": "1618118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784", "reference_id": "CVE-2006-2784", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-36", "reference_id": "mfsa2006-36", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-36" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-3/", "reference_id": "USN-297-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-3/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2784" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1azv-247b-xufb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36773?format=api", "vulnerability_id": "VCID-1bwt-pf55-7ubd", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3808.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3808.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3808", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84922", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84791", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84806", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84826", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84827", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.8485", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84856", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84875", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84873", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84888", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84886", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02341", "scoring_system": "epss", "scoring_elements": "0.84912", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3808" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168", "reference_id": "1618168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618168" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808", "reference_id": "CVE-2006-3808", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-52", "reference_id": "mfsa2006-52", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-52" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3808" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1bwt-pf55-7ubd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88860?format=api", "vulnerability_id": "VCID-2bqp-adeh-7kck", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2788.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92216", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92223", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92229", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92232", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92243", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92246", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92252", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92249", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.9226", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92262", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92267", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.08288", "scoring_system": "epss", "scoring_elements": "0.92263", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2788" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122", "reference_id": "1618122", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618122" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2788" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2bqp-adeh-7kck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36766?format=api", "vulnerability_id": "VCID-358q-cakg-h7h4", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3803.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3803.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3803", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96159", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96104", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96111", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96118", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96123", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96134", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96137", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.9614", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96141", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.9615", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96154", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96155", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.24704", "scoring_system": "epss", "scoring_elements": "0.96158", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3803" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163", "reference_id": "1618163", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803", "reference_id": "CVE-2006-3803", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-48", "reference_id": "mfsa2006-48", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-48" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3803" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-358q-cakg-h7h4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36777?format=api", "vulnerability_id": "VCID-72wd-b7rj-3fda", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3810.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3810.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94272", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94229", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94231", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.9424", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94248", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94249", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94263", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94269", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.1364", "scoring_system": "epss", "scoring_elements": "0.94273", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3810" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170", "reference_id": "1618170", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618170" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810", "reference_id": "CVE-2006-3810", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-54", "reference_id": "mfsa2006-54", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3810" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-72wd-b7rj-3fda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36764?format=api", "vulnerability_id": "VCID-8ffc-g2p2-xfax", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3801.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3801.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3801", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.9647", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96418", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96425", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96429", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96432", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96441", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96444", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96452", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96458", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96463", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96465", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96466", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.27761", "scoring_system": "epss", "scoring_elements": "0.96468", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3801" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161", "reference_id": "1618161", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618161" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801", "reference_id": "CVE-2006-3801", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-44", "reference_id": "mfsa2006-44", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-44" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3801" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8ffc-g2p2-xfax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36761?format=api", "vulnerability_id": "VCID-9u64-4cr7-w3e1", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3677.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3677.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3677", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98574", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98569", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.9857", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98572", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98573", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98557", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98559", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98561", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.67298", "scoring_system": "epss", "scoring_elements": "0.98563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.76758", "scoring_system": "epss", "scoring_elements": "0.98939", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.76758", "scoring_system": "epss", "scoring_elements": "0.98941", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.76758", "scoring_system": "epss", "scoring_elements": "0.98943", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3677" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153", "reference_id": "1618153", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677", "reference_id": "CVE-2006-3677", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2082.html", "reference_id": "CVE-2006-3677", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2082.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16300.rb", "reference_id": "CVE-2006-3677;OSVDB-27559", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16300.rb" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9946.rb", "reference_id": "CVE-2006-3677;OSVDB-27559", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9946.rb" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-45", "reference_id": "mfsa2006-45", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-45" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3677" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9u64-4cr7-w3e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32080?format=api", "vulnerability_id": "VCID-bj2j-3fjg-yyhr", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2782", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80765", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80629", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80637", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80659", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80655", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80682", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80692", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80695", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80721", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80722", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80747", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01435", "scoring_system": "epss", "scoring_elements": "0.80752", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2782" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116", "reference_id": "1618116", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618116" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782", "reference_id": "CVE-2006-2782", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-41", "reference_id": "mfsa2006-41", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-41" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2782" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bj2j-3fjg-yyhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32076?format=api", "vulnerability_id": "VCID-cggq-6c2f-1qf4", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2778", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95965", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.9591", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95918", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95926", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.9593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95939", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95941", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95945", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95947", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95958", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95962", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.23254", "scoring_system": "epss", "scoring_elements": "0.95964", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2778" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113", "reference_id": "1618113", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778", "reference_id": "CVE-2006-2778", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://security.gentoo.org/glsa/200606-21", "reference_id": "GLSA-200606-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-38", "reference_id": "mfsa2006-38", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-38" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-1/", "reference_id": "USN-297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-1/" }, { "reference_url": "https://usn.ubuntu.com/297-3/", "reference_id": "USN-297-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-3/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2778" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cggq-6c2f-1qf4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36770?format=api", "vulnerability_id": "VCID-dvd1-3gbf-d3gw", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3806.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3806.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3806", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96387", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96335", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96343", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96352", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.9636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96363", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96368", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96367", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.9637", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96378", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96384", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96385", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.27008", "scoring_system": "epss", "scoring_elements": "0.96386", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3806" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166", "reference_id": "1618166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806", "reference_id": "CVE-2006-3806", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50", "reference_id": "mfsa2006-50", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3806" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvd1-3gbf-d3gw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32079?format=api", "vulnerability_id": "VCID-fsff-rm4y-wudc", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2780", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96345", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96288", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96296", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96304", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96309", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96318", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96321", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96325", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96328", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96336", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96341", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96342", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96343", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.26533", "scoring_system": "epss", "scoring_elements": "0.96344", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2780" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115", "reference_id": "1618115", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780", "reference_id": "CVE-2006-2780", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://security.gentoo.org/glsa/200606-21", "reference_id": "GLSA-200606-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32", "reference_id": "mfsa2006-32", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-1/", "reference_id": "USN-297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-1/" }, { "reference_url": "https://usn.ubuntu.com/297-3/", "reference_id": "USN-297-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-3/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2780" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsff-rm4y-wudc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36776?format=api", "vulnerability_id": "VCID-fxyr-h69x-fybu", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3809.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3809.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86532", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86425", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86436", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86474", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86484", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86499", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86496", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86491", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86512", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86504", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02964", "scoring_system": "epss", "scoring_elements": "0.86533", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3809" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169", "reference_id": "1618169", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618169" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809", "reference_id": "CVE-2006-3809", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-53", "reference_id": "mfsa2006-53", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-53" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3809" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fxyr-h69x-fybu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32081?format=api", "vulnerability_id": "VCID-gs89-ejt1-q7db", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2783", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89714", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89647", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89662", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89664", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89681", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89694", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89686", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89702", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89703", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89697", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89713", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04975", "scoring_system": "epss", "scoring_elements": "0.89715", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2783" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117", "reference_id": "1618117", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783", "reference_id": "CVE-2006-2783", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://security.gentoo.org/glsa/200606-21", "reference_id": "GLSA-200606-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-42", "reference_id": "mfsa2006-42", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-42" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-1/", "reference_id": "USN-297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-1/" }, { "reference_url": "https://usn.ubuntu.com/297-3/", "reference_id": "USN-297-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-3/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2783" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs89-ejt1-q7db" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32085?format=api", "vulnerability_id": "VCID-kbyn-rze5-2qeg", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2787", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92704", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92662", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92668", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92678", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92683", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92688", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92701", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92705", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.09158", "scoring_system": "epss", "scoring_elements": "0.92708", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2787" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121", "reference_id": "1618121", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787", "reference_id": "CVE-2006-2787", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://security.gentoo.org/glsa/200606-21", "reference_id": "GLSA-200606-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-31", "reference_id": "mfsa2006-31", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-31" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-1/", "reference_id": "USN-297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-1/" }, { "reference_url": "https://usn.ubuntu.com/297-3/", "reference_id": "USN-297-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-3/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2787" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbyn-rze5-2qeg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36758?format=api", "vulnerability_id": "VCID-nkzt-x77d-8qb3", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3113.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3113.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3113", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96439", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96388", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.964", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96403", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96412", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96415", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.9642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96431", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96435", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96436", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.2749", "scoring_system": "epss", "scoring_elements": "0.96438", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3113" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135", "reference_id": "1618135", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618135" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113", "reference_id": "CVE-2006-3113", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-46", "reference_id": "mfsa2006-46", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-46" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3113" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nkzt-x77d-8qb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32083?format=api", "vulnerability_id": "VCID-nnxw-14g9-77da", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2785", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83795", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83654", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83667", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83681", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83684", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.8373", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83724", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83719", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83754", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83755", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83779", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02013", "scoring_system": "epss", "scoring_elements": "0.83787", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2785" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119", "reference_id": "1618119", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785", "reference_id": "CVE-2006-2785", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-34", "reference_id": "mfsa2006-34", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-34" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2785" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nnxw-14g9-77da" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36779?format=api", "vulnerability_id": "VCID-pyqg-v477-auex", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3811.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3811.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3811", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95335", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95276", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95288", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95293", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95298", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95306", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95309", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95314", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95316", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95323", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95327", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.9533", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95331", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.18952", "scoring_system": "epss", "scoring_elements": "0.95333", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3811" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171", "reference_id": "1618171", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811", "reference_id": "CVE-2006-3811", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-55", "reference_id": "mfsa2006-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-55" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3811" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyqg-v477-auex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36768?format=api", "vulnerability_id": "VCID-scb8-77mr-zkap", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3805.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3805.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3805", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95926", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.9587", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95878", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.9589", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95905", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95904", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95906", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95918", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95923", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.23003", "scoring_system": "epss", "scoring_elements": "0.95925", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3805" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165", "reference_id": "1618165", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618165" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805", "reference_id": "CVE-2006-3805", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50", "reference_id": "mfsa2006-50", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-50" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3805" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-scb8-77mr-zkap" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32084?format=api", "vulnerability_id": "VCID-t5kr-v1tx-5kdy", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2786", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85224", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85101", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85113", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85131", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85157", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85164", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85179", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85176", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85194", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85196", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85195", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85218", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02439", "scoring_system": "epss", "scoring_elements": "0.85227", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2786" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120", "reference_id": "1618120", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786", "reference_id": "CVE-2006-2786", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://security.gentoo.org/glsa/200606-21", "reference_id": "GLSA-200606-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-33", "reference_id": "mfsa2006-33", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-33" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-1/", "reference_id": "USN-297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-1/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2786" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t5kr-v1tx-5kdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32077?format=api", "vulnerability_id": "VCID-ucgx-bfkb-4kg5", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2779", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95967", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95914", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95922", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.9593", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95934", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95945", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95949", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95962", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95966", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.23286", "scoring_system": "epss", "scoring_elements": "0.95968", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2779" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114", "reference_id": "1618114", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779", "reference_id": "CVE-2006-2779", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://security.gentoo.org/glsa/200606-21", "reference_id": "GLSA-200606-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32", "reference_id": "mfsa2006-32", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-1/", "reference_id": "USN-297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-1/" }, { "reference_url": "https://usn.ubuntu.com/297-3/", "reference_id": "USN-297-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-3/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2779" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucgx-bfkb-4kg5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36765?format=api", "vulnerability_id": "VCID-vb9f-xdth-j7h3", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3802.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88076", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.87984", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.87994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88008", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88013", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88039", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88049", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88042", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88055", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88054", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88072", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03764", "scoring_system": "epss", "scoring_elements": "0.88077", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3802" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162", "reference_id": "1618162", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802", "reference_id": "CVE-2006-3802", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-47", "reference_id": "mfsa2006-47", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-47" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3802" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vb9f-xdth-j7h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36780?format=api", "vulnerability_id": "VCID-vqeh-hhax-fqba", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3812.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3812.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3812", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94209", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94143", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94153", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94164", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94167", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.9418", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.942", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13369", "scoring_system": "epss", "scoring_elements": "0.94208", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3812" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455", "reference_id": "200455", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=200455" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812", "reference_id": "CVE-2006-3812", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-56", "reference_id": "mfsa2006-56", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-56" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3812" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vqeh-hhax-fqba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32074?format=api", "vulnerability_id": "VCID-xewd-ab7q-5bfs", "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n JavaScript code, cross site scripting attacks, HTTP response smuggling and\n possibly the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96776", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96745", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96753", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96756", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96759", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96769", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96772", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96771", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.31164", "scoring_system": "epss", "scoring_elements": "0.96773", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2776" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112", "reference_id": "1618112", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776", "reference_id": "CVE-2006-2776", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776" }, { "reference_url": "https://security.gentoo.org/glsa/200606-12", "reference_id": "GLSA-200606-12", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-12" }, { "reference_url": "https://security.gentoo.org/glsa/200606-21", "reference_id": "GLSA-200606-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-21" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-37", "reference_id": "mfsa2006-37", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-37" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578", "reference_id": "RHSA-2006:0578", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0578" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/296-1/", "reference_id": "USN-296-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-1/" }, { "reference_url": "https://usn.ubuntu.com/296-2/", "reference_id": "USN-296-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/296-2/" }, { "reference_url": "https://usn.ubuntu.com/297-1/", "reference_id": "USN-297-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-1/" }, { "reference_url": "https://usn.ubuntu.com/297-3/", "reference_id": "USN-297-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/297-3/" }, { "reference_url": "https://usn.ubuntu.com/323-1/", "reference_id": "USN-323-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/323-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-2776" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xewd-ab7q-5bfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36771?format=api", "vulnerability_id": "VCID-xn67-qscw-nuet", "summary": "The Mozilla Foundation has reported numerous security vulnerabilities\n related to Mozilla SeaMonkey.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3807.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3807.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3807", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96576", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96525", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96539", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96542", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.9655", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96555", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96564", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.9657", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96573", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.28858", "scoring_system": "epss", "scoring_elements": "0.96575", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3807" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167", "reference_id": "1618167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807", "reference_id": "CVE-2006-3807", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807" }, { "reference_url": "https://security.gentoo.org/glsa/200608-02", "reference_id": "GLSA-200608-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-02" }, { "reference_url": "https://security.gentoo.org/glsa/200608-03", "reference_id": "GLSA-200608-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-03" }, { "reference_url": "https://security.gentoo.org/glsa/200608-04", "reference_id": "GLSA-200608-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200608-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-51", "reference_id": "mfsa2006-51", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-51" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594", "reference_id": "RHSA-2006:0594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0608", "reference_id": "RHSA-2006:0608", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0608" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609", "reference_id": "RHSA-2006:0609", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0609" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610", "reference_id": "RHSA-2006:0610", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0610" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611", "reference_id": "RHSA-2006:0611", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0611" }, { "reference_url": "https://usn.ubuntu.com/327-1/", "reference_id": "USN-327-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/327-1/" }, { "reference_url": "https://usn.ubuntu.com/329-1/", "reference_id": "USN-329-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/329-1/" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2006-3807" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xn67-qscw-nuet" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@1.5.0.5-0.el4%3Farch=1" }