Lookup for vulnerable packages by Package URL.

GET /api/packages/584855?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
    "type": "deb",
    "namespace": "debian",
    "name": "firefox",
    "version": "108.0-1",
    "qualifiers": {
        "distro": "sid"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "109.0-1",
    "latest_non_vulnerable_version": "150.0.1-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50248?format=api",
            "vulnerability_id": "VCID-aquh-9cjg-wyey",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46877.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46877.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65268",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65233",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65261",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65273",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65255",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65227",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65202",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00483",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65278",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66665",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00515",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66651",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46877"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162342",
                    "reference_id": "2162342",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162342"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5322",
                    "reference_id": "dsa-5322",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5322"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5355",
                    "reference_id": "dsa-5355",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5355"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-06",
                    "reference_id": "GLSA-202305-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-13",
                    "reference_id": "GLSA-202305-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-51/",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2022-51/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-02",
                    "reference_id": "mfsa2023-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-03",
                    "reference_id": "mfsa2023-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-03"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0285",
                    "reference_id": "RHSA-2023:0285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0285"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0286",
                    "reference_id": "RHSA-2023:0286",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0286"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0288",
                    "reference_id": "RHSA-2023:0288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0288"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0289",
                    "reference_id": "RHSA-2023:0289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0290",
                    "reference_id": "RHSA-2023:0290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0294",
                    "reference_id": "RHSA-2023:0294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0295",
                    "reference_id": "RHSA-2023:0295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0296",
                    "reference_id": "RHSA-2023:0296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0456",
                    "reference_id": "RHSA-2023:0456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0456"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0457",
                    "reference_id": "RHSA-2023:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0457"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0459",
                    "reference_id": "RHSA-2023:0459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0460",
                    "reference_id": "RHSA-2023:0460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0461",
                    "reference_id": "RHSA-2023:0461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0461"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0462",
                    "reference_id": "RHSA-2023:0462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0463",
                    "reference_id": "RHSA-2023:0463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0476",
                    "reference_id": "RHSA-2023:0476",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0476"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1795139",
                    "reference_id": "show_bug.cgi?id=1795139",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-15T13:52:17Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1795139"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5782-1/",
                    "reference_id": "USN-5782-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5782-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5824-1/",
                    "reference_id": "USN-5824-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5824-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
                    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088670?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-46877"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aquh-9cjg-wyey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50245?format=api",
            "vulnerability_id": "VCID-e4nx-qfam-cfaj",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46872.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54704",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54689",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54711",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54681",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54733",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54729",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54725",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00316",
                            "scoring_system": "epss",
                            "scoring_elements": "0.54742",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56493",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56494",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00337",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56513",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153441",
                    "reference_id": "2153441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153441"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-06",
                    "reference_id": "GLSA-202305-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-13",
                    "reference_id": "GLSA-202305-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52",
                    "reference_id": "mfsa2022-52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-53",
                    "reference_id": "mfsa2022-53",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-53"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9065",
                    "reference_id": "RHSA-2022:9065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9065"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9066",
                    "reference_id": "RHSA-2022:9066",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9066"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9067",
                    "reference_id": "RHSA-2022:9067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9068",
                    "reference_id": "RHSA-2022:9068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9068"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9069",
                    "reference_id": "RHSA-2022:9069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9069"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9070",
                    "reference_id": "RHSA-2022:9070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9070"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9071",
                    "reference_id": "RHSA-2022:9071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9071"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9072",
                    "reference_id": "RHSA-2022:9072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9072"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9074",
                    "reference_id": "RHSA-2022:9074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9074"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9075",
                    "reference_id": "RHSA-2022:9075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9075"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9076",
                    "reference_id": "RHSA-2022:9076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9076"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9077",
                    "reference_id": "RHSA-2022:9077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9078",
                    "reference_id": "RHSA-2022:9078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9078"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9079",
                    "reference_id": "RHSA-2022:9079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9080",
                    "reference_id": "RHSA-2022:9080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9081",
                    "reference_id": "RHSA-2022:9081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9081"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5782-1/",
                    "reference_id": "USN-5782-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5782-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5824-1/",
                    "reference_id": "USN-5824-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5824-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
                    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088670?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-46872"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e4nx-qfam-cfaj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50249?format=api",
            "vulnerability_id": "VCID-hp32-swmr-qqdy",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46878.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5765",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57671",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57617",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57614",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57668",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57673",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57687",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57666",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57646",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59148",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59144",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00375",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59163",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46878"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153454",
                    "reference_id": "2153454",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153454"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-06",
                    "reference_id": "GLSA-202305-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-13",
                    "reference_id": "GLSA-202305-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52",
                    "reference_id": "mfsa2022-52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-53",
                    "reference_id": "mfsa2022-53",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-53"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9065",
                    "reference_id": "RHSA-2022:9065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9065"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9066",
                    "reference_id": "RHSA-2022:9066",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9066"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9067",
                    "reference_id": "RHSA-2022:9067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9068",
                    "reference_id": "RHSA-2022:9068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9068"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9069",
                    "reference_id": "RHSA-2022:9069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9069"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9070",
                    "reference_id": "RHSA-2022:9070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9070"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9071",
                    "reference_id": "RHSA-2022:9071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9071"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9072",
                    "reference_id": "RHSA-2022:9072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9072"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9074",
                    "reference_id": "RHSA-2022:9074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9074"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9075",
                    "reference_id": "RHSA-2022:9075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9075"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9076",
                    "reference_id": "RHSA-2022:9076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9076"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9077",
                    "reference_id": "RHSA-2022:9077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9078",
                    "reference_id": "RHSA-2022:9078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9078"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9079",
                    "reference_id": "RHSA-2022:9079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9080",
                    "reference_id": "RHSA-2022:9080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9081",
                    "reference_id": "RHSA-2022:9081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9081"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5782-1/",
                    "reference_id": "USN-5782-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5782-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5824-1/",
                    "reference_id": "USN-5824-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5824-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
                    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088670?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-46878"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hp32-swmr-qqdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50244?format=api",
            "vulnerability_id": "VCID-kfxp-azcd-2yej",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46871.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46871.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76064",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76137",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76154",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7615",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7611",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76112",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76111",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76097",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76083",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76051",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76969",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76981",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00991",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76962",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46871"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162336",
                    "reference_id": "2162336",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162336"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5322",
                    "reference_id": "dsa-5322",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5322"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5355",
                    "reference_id": "dsa-5355",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5355"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-06",
                    "reference_id": "GLSA-202305-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-13",
                    "reference_id": "GLSA-202305-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202305-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2022-51/",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2022-51/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-02",
                    "reference_id": "mfsa2023-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-03",
                    "reference_id": "mfsa2023-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-03"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html",
                    "reference_id": "msg00015.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00015.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html",
                    "reference_id": "msg00018.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00018.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0285",
                    "reference_id": "RHSA-2023:0285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0285"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0286",
                    "reference_id": "RHSA-2023:0286",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0286"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0288",
                    "reference_id": "RHSA-2023:0288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0288"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0289",
                    "reference_id": "RHSA-2023:0289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0290",
                    "reference_id": "RHSA-2023:0290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0290"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0294",
                    "reference_id": "RHSA-2023:0294",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0294"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0295",
                    "reference_id": "RHSA-2023:0295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0295"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0296",
                    "reference_id": "RHSA-2023:0296",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0296"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0456",
                    "reference_id": "RHSA-2023:0456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0456"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0457",
                    "reference_id": "RHSA-2023:0457",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0457"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0459",
                    "reference_id": "RHSA-2023:0459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0460",
                    "reference_id": "RHSA-2023:0460",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0460"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0461",
                    "reference_id": "RHSA-2023:0461",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0461"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0462",
                    "reference_id": "RHSA-2023:0462",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0462"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0463",
                    "reference_id": "RHSA-2023:0463",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0463"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0476",
                    "reference_id": "RHSA-2023:0476",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0476"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1795697",
                    "reference_id": "show_bug.cgi?id=1795697",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-15T14:09:08Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1795697"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5782-1/",
                    "reference_id": "USN-5782-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5782-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5824-1/",
                    "reference_id": "USN-5824-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5824-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
                    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088670?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-46871"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kfxp-azcd-2yej"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61530?format=api",
            "vulnerability_id": "VCID-r9rc-27rr-13h6",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59026",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00373",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59039",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6725",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67227",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67278",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67291",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67311",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67263",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6731",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67289",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67298",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00531",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67226",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00566",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68526",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-06",
                    "reference_id": "GLSA-202305-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5782-1/",
                    "reference_id": "USN-5782-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5782-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
                    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088670?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-46879"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r9rc-27rr-13h6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61529?format=api",
            "vulnerability_id": "VCID-tf6z-7brv-dybw",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69356",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69285",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69302",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69282",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69332",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69349",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69371",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69355",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69327",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69365",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00596",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69375",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70475",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00634",
                            "scoring_system": "epss",
                            "scoring_elements": "0.70466",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46873"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-06",
                    "reference_id": "GLSA-202305-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5782-1/",
                    "reference_id": "USN-5782-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5782-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
                    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088670?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-46873"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tf6z-7brv-dybw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50246?format=api",
            "vulnerability_id": "VCID-yxy6-s185-myc9",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46874.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46874",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59387",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59405",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5933",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59353",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59318",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59368",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59382",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59384",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59399",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60885",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6088",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00403",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60892",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46874"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153449",
                    "reference_id": "2153449",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153449"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-06",
                    "reference_id": "GLSA-202305-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202305-13",
                    "reference_id": "GLSA-202305-13",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202305-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51",
                    "reference_id": "mfsa2022-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-51"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52",
                    "reference_id": "mfsa2022-52",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-52"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-54",
                    "reference_id": "mfsa2022-54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-54"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9065",
                    "reference_id": "RHSA-2022:9065",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9065"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9066",
                    "reference_id": "RHSA-2022:9066",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9066"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9067",
                    "reference_id": "RHSA-2022:9067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9068",
                    "reference_id": "RHSA-2022:9068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9068"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9069",
                    "reference_id": "RHSA-2022:9069",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9069"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9070",
                    "reference_id": "RHSA-2022:9070",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9070"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9071",
                    "reference_id": "RHSA-2022:9071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9071"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9072",
                    "reference_id": "RHSA-2022:9072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9072"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9074",
                    "reference_id": "RHSA-2022:9074",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9074"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9075",
                    "reference_id": "RHSA-2022:9075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9075"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9076",
                    "reference_id": "RHSA-2022:9076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9076"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9077",
                    "reference_id": "RHSA-2022:9077",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9077"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9078",
                    "reference_id": "RHSA-2022:9078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9078"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9079",
                    "reference_id": "RHSA-2022:9079",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9079"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9080",
                    "reference_id": "RHSA-2022:9080",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9080"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:9081",
                    "reference_id": "RHSA-2022:9081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:9081"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5782-1/",
                    "reference_id": "USN-5782-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5782-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5824-1/",
                    "reference_id": "USN-5824-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5824-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/584855?format=api",
                    "purl": "pkg:deb/debian/firefox@108.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582059?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059611?format=api",
                    "purl": "pkg:deb/debian/firefox@149.0.2-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076056?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088670?format=api",
                    "purl": "pkg:deb/debian/firefox@150.0.1-1?distro=sid",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"
                }
            ],
            "aliases": [
                "CVE-2022-46874"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yxy6-s185-myc9"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@108.0-1%3Fdistro=sid"
}