Lookup for vulnerable packages by Package URL.

GET /api/packages/74503?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
    "type": "ebuild",
    "namespace": "mail-client",
    "name": "mozilla-thunderbird",
    "version": "1.5.0.4",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.5.0.5",
    "latest_non_vulnerable_version": "10.0.11",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36568?format=api",
            "vulnerability_id": "VCID-2khw-6pqe-n3f2",
            "summary": "Several vulnerabilities in Mozilla Thunderbird allow cross site scripting,\n    JavaScript privilege escalation and possibly execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2781",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91644",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9158",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91588",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91594",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91603",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91616",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91622",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91629",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91646",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07236",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91639",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2781"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963",
                    "reference_id": "193963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=193963"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781",
                    "reference_id": "CVE-2006-2781",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-40",
                    "reference_id": "mfsa2006-40",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-40"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2781"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2khw-6pqe-n3f2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32076?format=api",
            "vulnerability_id": "VCID-cggq-6c2f-1qf4",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95965",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9591",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95918",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95926",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9593",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95939",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95941",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95945",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95947",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95958",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95962",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95964",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2778"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113",
                    "reference_id": "1618113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618113"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778",
                    "reference_id": "CVE-2006-2778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-38",
                    "reference_id": "mfsa2006-38",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-38"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2778"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cggq-6c2f-1qf4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32079?format=api",
            "vulnerability_id": "VCID-fsff-rm4y-wudc",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96344",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96288",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96296",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96304",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96318",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96325",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96328",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96336",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96341",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96342",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.26533",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96343",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2780"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115",
                    "reference_id": "1618115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780",
                    "reference_id": "CVE-2006-2780",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32",
                    "reference_id": "mfsa2006-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2780"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsff-rm4y-wudc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32081?format=api",
            "vulnerability_id": "VCID-gs89-ejt1-q7db",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89715",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89645",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89647",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89662",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89681",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89687",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89694",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89693",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89686",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89702",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89703",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89697",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04975",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89713",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2783"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117",
                    "reference_id": "1618117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618117"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783",
                    "reference_id": "CVE-2006-2783",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-42",
                    "reference_id": "mfsa2006-42",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-42"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2783"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gs89-ejt1-q7db"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32085?format=api",
            "vulnerability_id": "VCID-kbyn-rze5-2qeg",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92708",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92655",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92662",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92668",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92678",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92683",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92689",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92688",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92687",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92701",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09158",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92705",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2787"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121",
                    "reference_id": "1618121",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618121"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787",
                    "reference_id": "CVE-2006-2787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-31",
                    "reference_id": "mfsa2006-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2787"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kbyn-rze5-2qeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32084?format=api",
            "vulnerability_id": "VCID-t5kr-v1tx-5kdy",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2786",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85227",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85101",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85113",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85131",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85135",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85157",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85164",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85179",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85176",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85194",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85196",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85195",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02439",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85218",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2786"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120",
                    "reference_id": "1618120",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618120"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786",
                    "reference_id": "CVE-2006-2786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-33",
                    "reference_id": "mfsa2006-33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-33"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2786"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t5kr-v1tx-5kdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32073?format=api",
            "vulnerability_id": "VCID-u63v-3cmf-ryh6",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92065",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92017",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92023",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92031",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92036",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92051",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92055",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92067",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92064",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92062",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07929",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92066",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775",
                    "reference_id": "CVE-2006-2775",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-35",
                    "reference_id": "mfsa2006-35",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-35"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2775"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u63v-3cmf-ryh6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32077?format=api",
            "vulnerability_id": "VCID-ucgx-bfkb-4kg5",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2779",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95967",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95914",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95922",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9593",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95934",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95943",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95945",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95949",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95951",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95962",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95966",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23286",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95968",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2779"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114",
                    "reference_id": "1618114",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618114"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779",
                    "reference_id": "CVE-2006-2779",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32",
                    "reference_id": "mfsa2006-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2779"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ucgx-bfkb-4kg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32074?format=api",
            "vulnerability_id": "VCID-xewd-ab7q-5bfs",
            "summary": "Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96773",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96729",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96741",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96745",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96752",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96753",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96756",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96759",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96765",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96769",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.31164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96771",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-2776"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112",
                    "reference_id": "1618112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618112"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776",
                    "reference_id": "CVE-2006-2776",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-12",
                    "reference_id": "GLSA-200606-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-12"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200606-21",
                    "reference_id": "GLSA-200606-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200606-21"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-37",
                    "reference_id": "mfsa2006-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2006-37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0578",
                    "reference_id": "RHSA-2006:0578",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0578"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0594",
                    "reference_id": "RHSA-2006:0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0594"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0609",
                    "reference_id": "RHSA-2006:0609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0609"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0610",
                    "reference_id": "RHSA-2006:0610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2006:0611",
                    "reference_id": "RHSA-2006:0611",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2006:0611"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-1/",
                    "reference_id": "USN-296-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/296-2/",
                    "reference_id": "USN-296-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/296-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-1/",
                    "reference_id": "USN-297-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/297-3/",
                    "reference_id": "USN-297-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/297-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/323-1/",
                    "reference_id": "USN-323-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/323-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/74503?format=api",
                    "purl": "pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
                }
            ],
            "aliases": [
                "CVE-2006-2776"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xewd-ab7q-5bfs"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4"
}