Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/583974?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "type": "deb", "namespace": "debian", "name": "firefox", "version": "1.5.dfsg+1.5.0.7-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "45.0-1", "latest_non_vulnerable_version": "150.0-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34807?format=api", "vulnerability_id": "VCID-bdu3-hre7-9uej", "summary": "The Mozilla Foundation has reported multiple security vulnerabilities\n related to Mozilla Thunderbird.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4571.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4571.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4571", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.9369", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.9362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.9363", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93639", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93641", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.9365", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93652", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93657", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93676", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93682", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11638", "scoring_system": "epss", "scoring_elements": "0.93685", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4571" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=209167", "reference_id": "209167", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=209167" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571", "reference_id": "CVE-2006-4571", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4571" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://security.gentoo.org/glsa/200610-01", "reference_id": "GLSA-200610-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-01" }, { "reference_url": "https://security.gentoo.org/glsa/200610-04", "reference_id": "GLSA-200610-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-64", "reference_id": "mfsa2006-64", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-64" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0676", "reference_id": "RHSA-2006:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0677", "reference_id": "RHSA-2006:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0677" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" }, { "reference_url": "https://usn.ubuntu.com/352-1/", "reference_id": "USN-352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/352-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4571" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdu3-hre7-9uej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59017?format=api", "vulnerability_id": "VCID-efsu-6f8m-93en", "summary": "The Mozilla Foundation has reported numerous vulnerabilities in Mozilla\n Firefox, including one that may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4569.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4569.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4569", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84477", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84431", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84427", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84449", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02202", "scoring_system": "epss", "scoring_elements": "0.84451", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02578", "scoring_system": "epss", "scoring_elements": "0.85542", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02578", "scoring_system": "epss", "scoring_elements": "0.85567", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02578", "scoring_system": "epss", "scoring_elements": "0.85552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02578", "scoring_system": "epss", "scoring_elements": "0.85489", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02578", "scoring_system": "epss", "scoring_elements": "0.85501", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02578", "scoring_system": "epss", "scoring_elements": "0.85518", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02578", "scoring_system": "epss", "scoring_elements": "0.85522", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4569" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618195", "reference_id": "1618195", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569", "reference_id": "CVE-2006-4569", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4569" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-62", "reference_id": "mfsa2006-62", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-62" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4569" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-efsu-6f8m-93en" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/115833?format=api", "vulnerability_id": "VCID-h35v-jbx8-kbgd", "summary": "Mozilla Firefox 1.5.0.6 allows remote attackers to execute arbitrary JavaScript in the context of the browser's session with an arbitrary intranet web server, by hosting script on an Internet web server that can be made inaccessible by the attacker and that has a domain name under the attacker's control, which can force the browser to drop DNS pinning and perform a new DNS query for the domain name after the script is already running.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4561", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77459", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77466", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77501", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77511", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77536", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77521", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77517", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77557", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01048", "scoring_system": "epss", "scoring_elements": "0.77581", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4561" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4561" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h35v-jbx8-kbgd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59016?format=api", "vulnerability_id": "VCID-kzh6-b6jx-hbc4", "summary": "The Mozilla Foundation has reported numerous vulnerabilities in Mozilla\n Firefox, including one that may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4568.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4568.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4568", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80206", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80099", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80106", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80125", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80142", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80149", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80152", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80144", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80173", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80174", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01359", "scoring_system": "epss", "scoring_elements": "0.80177", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4568" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618194", "reference_id": "1618194", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568", "reference_id": "CVE-2006-4568", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4568" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://security.gentoo.org/glsa/200610-04", "reference_id": "GLSA-200610-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-61", "reference_id": "mfsa2006-61", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-61" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0676", "reference_id": "RHSA-2006:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0676" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4568" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kzh6-b6jx-hbc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34803?format=api", "vulnerability_id": "VCID-m1tv-6fpx-dudj", "summary": "The Mozilla Foundation has reported multiple security vulnerabilities\n related to Mozilla Thunderbird.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4565.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4565.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4565", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93236", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93174", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93188", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93185", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93194", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93198", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93203", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93201", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93202", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93218", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.93223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.10366", "scoring_system": "epss", "scoring_elements": "0.9323", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4565" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618191", "reference_id": "1618191", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565", "reference_id": "CVE-2006-4565", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4565" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://security.gentoo.org/glsa/200610-01", "reference_id": "GLSA-200610-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-01" }, { "reference_url": "https://security.gentoo.org/glsa/200610-04", "reference_id": "GLSA-200610-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-57", "reference_id": "mfsa2006-57", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0676", "reference_id": "RHSA-2006:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0677", "reference_id": "RHSA-2006:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0677" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" }, { "reference_url": "https://usn.ubuntu.com/352-1/", "reference_id": "USN-352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/352-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4565" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m1tv-6fpx-dudj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34801?format=api", "vulnerability_id": "VCID-scgj-9r68-due3", "summary": "The Mozilla Foundation has reported multiple security vulnerabilities\n related to Mozilla Thunderbird.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4253.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4253.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4253", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96738", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96695", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96705", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96706", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.9671", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96718", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.9672", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96722", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96725", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.30757", "scoring_system": "epss", "scoring_elements": "0.96736", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4253" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618177", "reference_id": "1618177", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618177" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253", "reference_id": "CVE-2006-4253", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4253" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28380.txt", "reference_id": "CVE-2006-4253;OSVDB-27975", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28380.txt" }, { "reference_url": "https://www.securityfocus.com/bid/19488/info", "reference_id": "CVE-2006-4253;OSVDB-27975", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/19488/info" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://security.gentoo.org/glsa/200610-01", "reference_id": "GLSA-200610-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-01" }, { "reference_url": "https://security.gentoo.org/glsa/200610-04", "reference_id": "GLSA-200610-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-59", "reference_id": "mfsa2006-59", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-59" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0676", "reference_id": "RHSA-2006:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0677", "reference_id": "RHSA-2006:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0677" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" }, { "reference_url": "https://usn.ubuntu.com/352-1/", "reference_id": "USN-352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/352-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4253" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-scgj-9r68-due3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34804?format=api", "vulnerability_id": "VCID-w8sy-3r3a-43ar", "summary": "The Mozilla Foundation has reported multiple security vulnerabilities\n related to Mozilla Thunderbird.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4566.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4566.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4566", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.17955", "scoring_system": "epss", "scoring_elements": "0.95149", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.17955", "scoring_system": "epss", "scoring_elements": "0.95118", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.17955", "scoring_system": "epss", "scoring_elements": "0.95129", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.17955", "scoring_system": "epss", "scoring_elements": "0.9513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17955", "scoring_system": "epss", "scoring_elements": "0.95132", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.17955", "scoring_system": "epss", "scoring_elements": "0.95139", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.17955", "scoring_system": "epss", "scoring_elements": "0.95143", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.24711", "scoring_system": "epss", "scoring_elements": "0.96158", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.24711", "scoring_system": "epss", "scoring_elements": "0.9614", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.24711", "scoring_system": "epss", "scoring_elements": "0.96142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.24711", "scoring_system": "epss", "scoring_elements": "0.9615", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.24711", "scoring_system": "epss", "scoring_elements": "0.96154", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.24711", "scoring_system": "epss", "scoring_elements": "0.96155", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4566" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618192", "reference_id": "1618192", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566", "reference_id": "CVE-2006-4566", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4566" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://security.gentoo.org/glsa/200610-01", "reference_id": "GLSA-200610-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-01" }, { "reference_url": "https://security.gentoo.org/glsa/200610-04", "reference_id": "GLSA-200610-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-04" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-57", "reference_id": "mfsa2006-57", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-57" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0676", "reference_id": "RHSA-2006:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0677", "reference_id": "RHSA-2006:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0677" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" }, { "reference_url": "https://usn.ubuntu.com/352-1/", "reference_id": "USN-352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/352-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4566" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8sy-3r3a-43ar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34802?format=api", "vulnerability_id": "VCID-x8eu-wc55-mkcw", "summary": "The Mozilla Foundation has reported multiple security vulnerabilities\n related to Mozilla Thunderbird.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4340.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4340.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4340", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.027", "scoring_system": "epss", "scoring_elements": "0.85895", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.027", "scoring_system": "epss", "scoring_elements": "0.85903", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.027", "scoring_system": "epss", "scoring_elements": "0.85886", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.027", "scoring_system": "epss", "scoring_elements": "0.85881", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.027", "scoring_system": "epss", "scoring_elements": "0.85899", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.027", "scoring_system": "epss", "scoring_elements": "0.85916", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03086", "scoring_system": "epss", "scoring_elements": "0.8679", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03086", "scoring_system": "epss", "scoring_elements": "0.8675", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03086", "scoring_system": "epss", "scoring_elements": "0.86749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03086", "scoring_system": "epss", "scoring_elements": "0.86768", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03086", "scoring_system": "epss", "scoring_elements": "0.86777", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05636", "scoring_system": "epss", "scoring_elements": "0.90309", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05636", "scoring_system": "epss", "scoring_elements": "0.90306", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4340" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618183", "reference_id": "1618183", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618183" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340", "reference_id": "CVE-2006-4340", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://security.gentoo.org/glsa/200610-01", "reference_id": "GLSA-200610-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-01" }, { "reference_url": "https://security.gentoo.org/glsa/200610-06", "reference_id": "GLSA-200610-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-60", "reference_id": "mfsa2006-60", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-60" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0676", "reference_id": "RHSA-2006:0676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0677", "reference_id": "RHSA-2006:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0677" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" }, { "reference_url": "https://usn.ubuntu.com/352-1/", "reference_id": "USN-352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/352-1/" }, { "reference_url": "https://usn.ubuntu.com/361-1/", "reference_id": "USN-361-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/361-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4340" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8eu-wc55-mkcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34805?format=api", "vulnerability_id": "VCID-xtch-eqwb-s3ag", "summary": "The Mozilla Foundation has reported multiple security vulnerabilities\n related to Mozilla Thunderbird.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4567.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4567.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4567", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00994", "scoring_system": "epss", "scoring_elements": "0.76985", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00994", "scoring_system": "epss", "scoring_elements": "0.76921", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00994", "scoring_system": "epss", "scoring_elements": "0.76917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00994", "scoring_system": "epss", "scoring_elements": "0.76957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00994", "scoring_system": "epss", "scoring_elements": "0.7696", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00994", "scoring_system": "epss", "scoring_elements": "0.76952", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81677", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81696", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81614", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81625", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81647", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01597", "scoring_system": "epss", "scoring_elements": "0.81672", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4567" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618193", "reference_id": "1618193", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618193" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567", "reference_id": "CVE-2006-4567", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4567" }, { "reference_url": "https://security.gentoo.org/glsa/200609-19", "reference_id": "GLSA-200609-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-19" }, { "reference_url": "https://security.gentoo.org/glsa/200610-01", "reference_id": "GLSA-200610-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200610-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-58", "reference_id": "mfsa2006-58", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-58" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0675", "reference_id": "RHSA-2006:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0677", "reference_id": "RHSA-2006:0677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0677" }, { "reference_url": "https://usn.ubuntu.com/350-1/", "reference_id": "USN-350-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/350-1/" }, { "reference_url": "https://usn.ubuntu.com/351-1/", "reference_id": "USN-351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/351-1/" }, { "reference_url": "https://usn.ubuntu.com/352-1/", "reference_id": "USN-352-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/352-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583974?format=api", "purl": "pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.7-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api", "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api", "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api", "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid" } ], "aliases": [ "CVE-2006-4567" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xtch-eqwb-s3ag" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.7-1%3Fdistro=sid" }