Lookup for vulnerable packages by Package URL.

GET /api/packages/77569?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
    "type": "ebuild",
    "namespace": "www-client",
    "name": "seamonkey",
    "version": "1.1.9-r1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.1.11",
    "latest_non_vulnerable_version": "31.5.3",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48627?format=api",
            "vulnerability_id": "VCID-3tuj-c9xa-e3aj",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0416.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0416",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92518",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92461",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92467",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92476",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92479",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92491",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92495",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92501",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92503",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92502",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92512",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92515",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.08734",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92517",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.09262",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92747",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0416"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431740",
                    "reference_id": "431740",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416",
                    "reference_id": "CVE-2008-0416",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0416"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-13",
                    "reference_id": "mfsa2008-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-13"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0416"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3tuj-c9xa-e3aj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48647?format=api",
            "vulnerability_id": "VCID-3x1b-2g3n-sybh",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1240",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8957",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89503",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89519",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89539",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89546",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89543",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89552",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89554",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89551",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04851",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89566",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1240"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240",
                    "reference_id": "CVE-2008-1240",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1240"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-18",
                    "reference_id": "mfsa2008-18",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-18"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1240"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3x1b-2g3n-sybh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48644?format=api",
            "vulnerability_id": "VCID-44pm-j3ma-9qgx",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1236.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1236.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1236",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96295",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96241",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96249",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96256",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96261",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9627",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96273",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96277",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9629",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96294",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.31817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96821",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.31817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96817",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.31817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96818",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1236"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438718",
                    "reference_id": "438718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236",
                    "reference_id": "CVE-2008-1236",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1236"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-15",
                    "reference_id": "mfsa2008-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-15"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0207",
                    "reference_id": "RHSA-2008:0207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0209",
                    "reference_id": "RHSA-2008:0209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/605-1/",
                    "reference_id": "USN-605-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/605-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1236"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-44pm-j3ma-9qgx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48646?format=api",
            "vulnerability_id": "VCID-474s-ddrw-4fgr",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1238.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1238.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1238",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90176",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90118",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90121",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90133",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90137",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90153",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90159",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90168",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90167",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90162",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05425",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90179",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91612",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91615",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07189",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91614",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1238"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438724",
                    "reference_id": "438724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238",
                    "reference_id": "CVE-2008-1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1238"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-16",
                    "reference_id": "mfsa2008-16",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-16"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0207",
                    "reference_id": "RHSA-2008:0207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0209",
                    "reference_id": "RHSA-2008:0209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1238"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-474s-ddrw-4fgr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48612?format=api",
            "vulnerability_id": "VCID-4ejp-1e65-h3at",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4879",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81354",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81217",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81226",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81249",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81248",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81276",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81302",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81288",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8132",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81319",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81342",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81349",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4879"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879",
                    "reference_id": "CVE-2007-4879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4879"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-17",
                    "reference_id": "mfsa2008-17",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-17"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2007-4879"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4ejp-1e65-h3at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48643?format=api",
            "vulnerability_id": "VCID-74k3-cpxf-f3ag",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1235.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1235.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1235",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95361",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95308",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95319",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9533",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95337",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9534",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95345",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95346",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95348",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95355",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.19121",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95359",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.23963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96047",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.23963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96046",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.23963",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96048",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1235"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438717",
                    "reference_id": "438717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438717"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235",
                    "reference_id": "CVE-2008-1235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1235"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-14",
                    "reference_id": "mfsa2008-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0207",
                    "reference_id": "RHSA-2008:0207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0209",
                    "reference_id": "RHSA-2008:0209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/605-1/",
                    "reference_id": "USN-605-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/605-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1235"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-74k3-cpxf-f3ag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48625?format=api",
            "vulnerability_id": "VCID-8h4q-2ubw-vudu",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0414.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0414.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83347",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83203",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83219",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83234",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83232",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83257",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83266",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83282",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83276",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83272",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83308",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83309",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83311",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83334",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01906",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83341",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0414"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=432040",
                    "reference_id": "432040",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414",
                    "reference_id": "CVE-2008-0414",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0414"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-02",
                    "reference_id": "mfsa2008-02",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-02"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0414"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8h4q-2ubw-vudu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48634?format=api",
            "vulnerability_id": "VCID-8r7s-6f5v-67f7",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0420.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0420",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8622",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86109",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86119",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86135",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86154",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86165",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8618",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86178",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86174",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86191",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86197",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86188",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02828",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8621",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0420"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431750",
                    "reference_id": "431750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431750"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420",
                    "reference_id": "CVE-2008-0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0420"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-07",
                    "reference_id": "mfsa2008-07",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0420"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8r7s-6f5v-67f7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42900?format=api",
            "vulnerability_id": "VCID-92uw-ru6r-7bcz",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1380.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1380.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1380",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94997",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94949",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9496",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94962",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9497",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94974",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94979",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94981",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94983",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94991",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94995",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.17011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94998",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1380"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=440518",
                    "reference_id": "440518",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=440518"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380",
                    "reference_id": "CVE-2008-1380",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1380"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200808-03",
                    "reference_id": "GLSA-200808-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200808-03"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-20",
                    "reference_id": "mfsa2008-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0222",
                    "reference_id": "RHSA-2008:0222",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0222"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0223",
                    "reference_id": "RHSA-2008:0223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0223"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0224",
                    "reference_id": "RHSA-2008:0224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0224"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/602-1/",
                    "reference_id": "USN-602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76171?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.11",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.11"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/76172?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.16",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.16"
                }
            ],
            "aliases": [
                "CVE-2008-1380"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-92uw-ru6r-7bcz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48635?format=api",
            "vulnerability_id": "VCID-9y9r-1gqw-6fgk",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0591.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0591",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91719",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91659",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91667",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91673",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91694",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91701",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91704",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91707",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91703",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91724",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91716",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91718",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91723",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.07342",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91721",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0591"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431751",
                    "reference_id": "431751",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431751"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591",
                    "reference_id": "CVE-2008-0591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0591"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-08",
                    "reference_id": "mfsa2008-08",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0591"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9y9r-1gqw-6fgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48626?format=api",
            "vulnerability_id": "VCID-ea68-57qy-1kax",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0415.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0415",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83734",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83595",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83607",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83622",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83624",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83648",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83655",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83672",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83665",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83695",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83696",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83721",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02001",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83728",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0415"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431739",
                    "reference_id": "431739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415",
                    "reference_id": "CVE-2008-0415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0415"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-03",
                    "reference_id": "mfsa2008-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0415"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ea68-57qy-1kax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48613?format=api",
            "vulnerability_id": "VCID-fzxh-1prr-c7et",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0304.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96724",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96676",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96686",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96689",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96693",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96701",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96702",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96705",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96708",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96714",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96718",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96721",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9672",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.30512",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96722",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0304"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=435123",
                    "reference_id": "435123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435123"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304",
                    "reference_id": "CVE-2008-0304",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0304"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-12",
                    "reference_id": "mfsa2008-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0304"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fzxh-1prr-c7et"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48641?format=api",
            "vulnerability_id": "VCID-gy61-bm88-u3e7",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1233.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1233.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95467",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95415",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95424",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9543",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95434",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9544",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95443",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95447",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95458",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.19859",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95463",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.24819",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9617",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.24819",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96169",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1233"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438713",
                    "reference_id": "438713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233",
                    "reference_id": "CVE-2008-1233",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1233"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-14",
                    "reference_id": "mfsa2008-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0207",
                    "reference_id": "RHSA-2008:0207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0209",
                    "reference_id": "RHSA-2008:0209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/605-1/",
                    "reference_id": "USN-605-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/605-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1233"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gy61-bm88-u3e7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48633?format=api",
            "vulnerability_id": "VCID-h91r-2kyx-v7f8",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0419.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0419",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95296",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9524",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95252",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95255",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9526",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95267",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95275",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95286",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95291",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95293",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.18686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95294",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0419"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431749",
                    "reference_id": "431749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431749"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419",
                    "reference_id": "CVE-2008-0419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0419"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-06",
                    "reference_id": "mfsa2008-06",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-06"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0419"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h91r-2kyx-v7f8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48642?format=api",
            "vulnerability_id": "VCID-jktq-6e2e-2ya7",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1234.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1234.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1234",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91611",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91549",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91556",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91562",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91571",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91584",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9159",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91596",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07194",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91616",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.09458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9283",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92833",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.09458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92834",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1234"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438715",
                    "reference_id": "438715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234",
                    "reference_id": "CVE-2008-1234",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1234"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-14",
                    "reference_id": "mfsa2008-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0207",
                    "reference_id": "RHSA-2008:0207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0209",
                    "reference_id": "RHSA-2008:0209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/605-1/",
                    "reference_id": "USN-605-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/605-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1234"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jktq-6e2e-2ya7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48651?format=api",
            "vulnerability_id": "VCID-m1wx-33dp-myds",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1241.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1241.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8727",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87204",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87214",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87231",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87228",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87248",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87255",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87267",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87261",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87257",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87272",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03312",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87276",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89077",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89067",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04431",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89075",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1241"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438730",
                    "reference_id": "438730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241",
                    "reference_id": "CVE-2008-1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1241"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-19",
                    "reference_id": "mfsa2008-19",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-19"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0207",
                    "reference_id": "RHSA-2008:0207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0209",
                    "reference_id": "RHSA-2008:0209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1241"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m1wx-33dp-myds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48628?format=api",
            "vulnerability_id": "VCID-mzfs-kyvw-qqe4",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0417.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0417.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0417",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84174",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84043",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84056",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84074",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84097",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84103",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84121",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84115",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84111",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84133",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84135",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84138",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84162",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02112",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84169",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0417"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431742",
                    "reference_id": "431742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431742"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417",
                    "reference_id": "CVE-2008-0417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0417"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-04",
                    "reference_id": "mfsa2008-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0417"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mzfs-kyvw-qqe4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48631?format=api",
            "vulnerability_id": "VCID-pkeq-w64f-5bda",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0418.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0418",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97265",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97222",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97228",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97233",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97234",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97243",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97244",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97248",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97249",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97257",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97259",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.38662",
                            "scoring_system": "epss",
                            "scoring_elements": "0.97263",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0418"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431748",
                    "reference_id": "431748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418",
                    "reference_id": "CVE-2008-0418",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0418"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt",
                    "reference_id": "CVE-2008-0418;OSVDB-41187",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/31051.txt"
                },
                {
                    "reference_url": "https://www.securityfocus.com/bid/27406/info",
                    "reference_id": "CVE-2008-0418;OSVDB-41187",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://www.securityfocus.com/bid/27406/info"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-05",
                    "reference_id": "mfsa2008-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0418"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pkeq-w64f-5bda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48621?format=api",
            "vulnerability_id": "VCID-pr7b-3h2r-aubm",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0413.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0413",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92138",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92094",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92101",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92112",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92123",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92126",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9213",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92131",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92137",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92134",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0805",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92135",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0413"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431733",
                    "reference_id": "431733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413",
                    "reference_id": "CVE-2008-0413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0413"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01",
                    "reference_id": "mfsa2008-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0413"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pr7b-3h2r-aubm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48645?format=api",
            "vulnerability_id": "VCID-snrh-b3y9-gybx",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1237.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1237.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1237",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96294",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96295",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96241",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96249",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96256",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96261",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9627",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96273",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96277",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.26048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9629",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.31817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96821",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.31817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96817",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.31817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96818",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1237"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438721",
                    "reference_id": "438721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237",
                    "reference_id": "CVE-2008-1237",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1237"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-15",
                    "reference_id": "mfsa2008-15",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-15"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-20",
                    "reference_id": "mfsa2008-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0207",
                    "reference_id": "RHSA-2008:0207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0208",
                    "reference_id": "RHSA-2008:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0209",
                    "reference_id": "RHSA-2008:0209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0209"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/592-1/",
                    "reference_id": "USN-592-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/592-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/605-1/",
                    "reference_id": "USN-605-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/605-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-1237"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snrh-b3y9-gybx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48640?format=api",
            "vulnerability_id": "VCID-swhd-4ja4-43h6",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0594.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0594.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0594",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82334",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82206",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82219",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82239",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82235",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82261",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82269",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82288",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82281",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82275",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8231",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82311",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82313",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82907",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01811",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82902",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0594"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=432036",
                    "reference_id": "432036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=432036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594",
                    "reference_id": "CVE-2008-0594",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0594"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-11",
                    "reference_id": "mfsa2008-11",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-11"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0594"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-swhd-4ja4-43h6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48639?format=api",
            "vulnerability_id": "VCID-vrc7-3rm4-b3fk",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0593.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78037",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77898",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77915",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77942",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77946",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77973",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77958",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77956",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77991",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7799",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77983",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78016",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01092",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78023",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0593"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431756",
                    "reference_id": "431756",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431756"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593",
                    "reference_id": "CVE-2008-0593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0593"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-10",
                    "reference_id": "mfsa2008-10",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-10"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0593"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vrc7-3rm4-b3fk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48615?format=api",
            "vulnerability_id": "VCID-vvtb-nt5x-3yh9",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0412.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93663",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93595",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93605",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93614",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93615",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93624",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93632",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93633",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93651",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93657",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93662",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93666",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.11553",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93665",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0412"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431732",
                    "reference_id": "431732",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412",
                    "reference_id": "CVE-2008-0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0412"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01",
                    "reference_id": "mfsa2008-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/582-1/",
                    "reference_id": "USN-582-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/582-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0412"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvtb-nt5x-3yh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48638?format=api",
            "vulnerability_id": "VCID-xv3s-67bq-1ugj",
            "summary": "Multiple vulnerabilities have been reported in Mozilla Firefox,\n    Thunderbird, SeaMonkey and XULRunner, some of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0592.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0592",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87456",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87376",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87391",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87409",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87417",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87429",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87424",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8742",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87435",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87437",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87432",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87449",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03401",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87455",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0592"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431752",
                    "reference_id": "431752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431752"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592",
                    "reference_id": "CVE-2008-0592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0592"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-18",
                    "reference_id": "GLSA-200805-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-18"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-09",
                    "reference_id": "mfsa2008-09",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2008-09"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0103",
                    "reference_id": "RHSA-2008:0103",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0103"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0104",
                    "reference_id": "RHSA-2008:0104",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2008:0105",
                    "reference_id": "RHSA-2008:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2008:0105"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/576-1/",
                    "reference_id": "USN-576-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/576-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77569?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@1.1.9-r1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/77570?format=api",
                    "purl": "pkg:ebuild/www-client/seamonkey@2.0.0.14",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@2.0.0.14"
                }
            ],
            "aliases": [
                "CVE-2008-0592"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xv3s-67bq-1ugj"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/seamonkey@1.1.9-r1"
}