Lookup for vulnerable packages by Package URL.

GET /api/packages/582677?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "firefox",
    "version": "128.0-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "129.0-1",
    "latest_non_vulnerable_version": "150.0-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57338?format=api",
            "vulnerability_id": "VCID-253e-56sw-77b1",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69211",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69154",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69136",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69185",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69205",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69227",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69212",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69184",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69223",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69232",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69133",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6611"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:42Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:42Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1844827",
                    "reference_id": "show_bug.cgi?id=1844827",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:42Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1844827"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6611"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-253e-56sw-77b1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57333?format=api",
            "vulnerability_id": "VCID-4vg5-9865-s3b2",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40481",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40595",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40516",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40567",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40577",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40596",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40559",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4054",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40588",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40558",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40568",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6606"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:02:06Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:02:06Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902305",
                    "reference_id": "show_bug.cgi?id=1902305",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:02:06Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902305"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6606"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4vg5-9865-s3b2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57340?format=api",
            "vulnerability_id": "VCID-6qv9-5wrf-cfee",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22822",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22802",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22928",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22947",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2291",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22853",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22868",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22861",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22966",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2301",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6613"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-22T17:43:42Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-22T17:43:42Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1900523",
                    "reference_id": "show_bug.cgi?id=1900523",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-22T17:43:42Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1900523"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6613"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qv9-5wrf-cfee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57341?format=api",
            "vulnerability_id": "VCID-dzdd-y6rv-dbe2",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4371",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43767",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.437",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4375",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43753",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43773",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43741",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43725",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43786",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43777",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00212",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43742",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6614"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:13:04Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:13:04Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902983",
                    "reference_id": "show_bug.cgi?id=1902983",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:13:04Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902983"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6614"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzdd-y6rv-dbe2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36102?format=api",
            "vulnerability_id": "VCID-frvc-mqhd-eydh",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6601.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29602",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29784",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29745",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29708",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29646",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2983",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29669",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29651",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29703",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29747",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296636",
                    "reference_id": "2296636",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296636"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-06",
                    "reference_id": "GLSA-202412-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-13",
                    "reference_id": "GLSA-202412-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4500",
                    "reference_id": "RHSA-2024:4500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4501",
                    "reference_id": "RHSA-2024:4501",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4501"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4508",
                    "reference_id": "RHSA-2024:4508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4517",
                    "reference_id": "RHSA-2024:4517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4586",
                    "reference_id": "RHSA-2024:4586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4590",
                    "reference_id": "RHSA-2024:4590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4610",
                    "reference_id": "RHSA-2024:4610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4624",
                    "reference_id": "RHSA-2024:4624",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4624"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625",
                    "reference_id": "RHSA-2024:4625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4634",
                    "reference_id": "RHSA-2024:4634",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4634"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4635",
                    "reference_id": "RHSA-2024:4635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670",
                    "reference_id": "RHSA-2024:4670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671",
                    "reference_id": "RHSA-2024:4671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4673",
                    "reference_id": "RHSA-2024:4673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717",
                    "reference_id": "RHSA-2024:4717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4717"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718",
                    "reference_id": "RHSA-2024:4718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4718"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894",
                    "reference_id": "RHSA-2024:4894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4894"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1890748",
                    "reference_id": "show_bug.cgi?id=1890748",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:21:13Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1890748"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6903-1/",
                    "reference_id": "USN-6903-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6903-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6601"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frvc-mqhd-eydh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57334?format=api",
            "vulnerability_id": "VCID-geqm-dd33-cuc5",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76146",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76092",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76073",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76106",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7612",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76145",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76121",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76118",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76159",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76163",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00932",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7606",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6607"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-15T21:34:59Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-15T21:34:59Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1694513",
                    "reference_id": "show_bug.cgi?id=1694513",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-15T21:34:59Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1694513"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6607"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-geqm-dd33-cuc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62620?format=api",
            "vulnerability_id": "VCID-m9h1-aw7r-jqb2",
            "summary": "An error in the ECMA-262 specification relating to Async Generators could have resulted in a type confusion, potentially leading to memory corruption and an exploitable crash.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7652.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7652.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51124",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51146",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51141",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51102",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51086",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51043",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51062",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51118",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5114",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51096",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00277",
                            "scoring_system": "epss",
                            "scoring_elements": "0.511",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-7652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310490",
                    "reference_id": "2310490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310490"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6681",
                    "reference_id": "RHSA-2024:6681",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6681"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6682",
                    "reference_id": "RHSA-2024:6682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6683",
                    "reference_id": "RHSA-2024:6683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6684",
                    "reference_id": "RHSA-2024:6684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6684"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6719",
                    "reference_id": "RHSA-2024:6719",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6719"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6720",
                    "reference_id": "RHSA-2024:6720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6721",
                    "reference_id": "RHSA-2024:6721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6721"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6722",
                    "reference_id": "RHSA-2024:6722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6722"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6723",
                    "reference_id": "RHSA-2024:6723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6723"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6782",
                    "reference_id": "RHSA-2024:6782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6782"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6786",
                    "reference_id": "RHSA-2024:6786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6786"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6816",
                    "reference_id": "RHSA-2024:6816",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6816"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6838",
                    "reference_id": "RHSA-2024:6838",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6838"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839",
                    "reference_id": "RHSA-2024:6839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6839"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6850",
                    "reference_id": "RHSA-2024:6850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6850"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6891",
                    "reference_id": "RHSA-2024:6891",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6891"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6892",
                    "reference_id": "RHSA-2024:6892",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6892"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1901411",
                    "reference_id": "show_bug.cgi?id=1901411",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-06T20:13:40Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1901411"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-7652"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m9h1-aw7r-jqb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57339?format=api",
            "vulnerability_id": "VCID-muvd-ax39-5qf7",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50784",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50722",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50747",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50703",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50759",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50755",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50799",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50775",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.50805",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6612"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T18:29:05Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T18:29:05Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880374",
                    "reference_id": "show_bug.cgi?id=1880374",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-09T18:29:05Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880374"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6612"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-muvd-ax39-5qf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57336?format=api",
            "vulnerability_id": "VCID-paez-g9wh-mfeq",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68696",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6862",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68614",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68665",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68707",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68694",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68664",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00572",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68717",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6609"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839258",
                    "reference_id": "show_bug.cgi?id=1839258",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-22T19:02:00Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1839258"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6609"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-paez-g9wh-mfeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57335?format=api",
            "vulnerability_id": "VCID-qgte-aw18-wuev",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31109",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31306",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31126",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31178",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31214",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31171",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31127",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3116",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3114",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31265",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6608"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:06:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:06:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1743329",
                    "reference_id": "show_bug.cgi?id=1743329",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:06:03Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1743329"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6608"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qgte-aw18-wuev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57342?format=api",
            "vulnerability_id": "VCID-qw18-3u5b-e7dt",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69222",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69166",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69147",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69196",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69215",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69223",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69195",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69234",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69243",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69145",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6615"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1892875%2C1894428%2C1898364",
                    "reference_id": "buglist.cgi?bug_id=1892875%2C1894428%2C1898364",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:05:12Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1892875%2C1894428%2C1898364"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:05:12Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-09T15:05:12Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6615"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qw18-3u5b-e7dt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57337?format=api",
            "vulnerability_id": "VCID-r27v-bxdj-7fgk",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24897",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2511",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24885",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24998",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25012",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24971",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24917",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2493",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24922",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25072",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6610"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:20:40Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:20:40Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883396",
                    "reference_id": "show_bug.cgi?id=1883396",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-23T19:20:40Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1883396"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6610"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r27v-bxdj-7fgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36104?format=api",
            "vulnerability_id": "VCID-svqy-5b6h-7yfj",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6603.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57068",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57095",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57048",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.571",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57098",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57047",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57069",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57067",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5709",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00344",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57111",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296638",
                    "reference_id": "2296638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296638"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-06",
                    "reference_id": "GLSA-202412-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-13",
                    "reference_id": "GLSA-202412-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4500",
                    "reference_id": "RHSA-2024:4500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4501",
                    "reference_id": "RHSA-2024:4501",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4501"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4508",
                    "reference_id": "RHSA-2024:4508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4517",
                    "reference_id": "RHSA-2024:4517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4586",
                    "reference_id": "RHSA-2024:4586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4590",
                    "reference_id": "RHSA-2024:4590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4610",
                    "reference_id": "RHSA-2024:4610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4624",
                    "reference_id": "RHSA-2024:4624",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4624"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625",
                    "reference_id": "RHSA-2024:4625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4634",
                    "reference_id": "RHSA-2024:4634",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4634"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4635",
                    "reference_id": "RHSA-2024:4635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670",
                    "reference_id": "RHSA-2024:4670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671",
                    "reference_id": "RHSA-2024:4671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4673",
                    "reference_id": "RHSA-2024:4673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717",
                    "reference_id": "RHSA-2024:4717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4717"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718",
                    "reference_id": "RHSA-2024:4718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4718"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894",
                    "reference_id": "RHSA-2024:4894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4894"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895081",
                    "reference_id": "show_bug.cgi?id=1895081",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T15:12:02Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895081"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6903-1/",
                    "reference_id": "USN-6903-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6903-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6603"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-svqy-5b6h-7yfj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36105?format=api",
            "vulnerability_id": "VCID-t52p-7rr7-57ax",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6604.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59509",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59526",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59447",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59503",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5949",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59439",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59472",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5952",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59486",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59506",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0038",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59522",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296639",
                    "reference_id": "2296639",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296639"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266",
                    "reference_id": "buglist.cgi?bug_id=1748105%2C1837550%2C1884266",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-06",
                    "reference_id": "GLSA-202412-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-13",
                    "reference_id": "GLSA-202412-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:20:14Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4500",
                    "reference_id": "RHSA-2024:4500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4501",
                    "reference_id": "RHSA-2024:4501",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4501"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4508",
                    "reference_id": "RHSA-2024:4508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4517",
                    "reference_id": "RHSA-2024:4517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4517"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4586",
                    "reference_id": "RHSA-2024:4586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4590",
                    "reference_id": "RHSA-2024:4590",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4590"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4610",
                    "reference_id": "RHSA-2024:4610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4624",
                    "reference_id": "RHSA-2024:4624",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4624"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625",
                    "reference_id": "RHSA-2024:4625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4634",
                    "reference_id": "RHSA-2024:4634",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4634"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4635",
                    "reference_id": "RHSA-2024:4635",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670",
                    "reference_id": "RHSA-2024:4670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671",
                    "reference_id": "RHSA-2024:4671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4673",
                    "reference_id": "RHSA-2024:4673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4673"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717",
                    "reference_id": "RHSA-2024:4717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4717"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718",
                    "reference_id": "RHSA-2024:4718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4718"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894",
                    "reference_id": "RHSA-2024:4894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4894"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6903-1/",
                    "reference_id": "USN-6903-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6903-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6604"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t52p-7rr7-57ax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36103?format=api",
            "vulnerability_id": "VCID-w794-gqex-83du",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6602.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73534",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73541",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73471",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73532",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7349",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7348",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73443",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73448",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73497",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73517",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00768",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73493",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-6602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7652"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296637",
                    "reference_id": "2296637",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2296637"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-04",
                    "reference_id": "GLSA-202412-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-06",
                    "reference_id": "GLSA-202412-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-13",
                    "reference_id": "GLSA-202412-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-29/",
                    "reference_id": "mfsa2024-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-30"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-30/",
                    "reference_id": "mfsa2024-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-31"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-31/",
                    "reference_id": "mfsa2024-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-32"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-32/",
                    "reference_id": "mfsa2024-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4625",
                    "reference_id": "RHSA-2024:4625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4670",
                    "reference_id": "RHSA-2024:4670",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4670"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4671",
                    "reference_id": "RHSA-2024:4671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4717",
                    "reference_id": "RHSA-2024:4717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4717"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4718",
                    "reference_id": "RHSA-2024:4718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4718"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:4894",
                    "reference_id": "RHSA-2024:4894",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:4894"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:6839",
                    "reference_id": "RHSA-2024:6839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:6839"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032",
                    "reference_id": "show_bug.cgi?id=1895032",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-09T16:54:31Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6890-1/",
                    "reference_id": "USN-6890-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6890-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6903-1/",
                    "reference_id": "USN-6903-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6903-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582677?format=api",
                    "purl": "pkg:deb/debian/firefox@128.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2024-6602"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w794-gqex-83du"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@128.0-1%3Fdistro=sid"
}