Lookup for vulnerable packages by Package URL.

GET /api/packages/86502?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
    "purl": "pkg:mozilla/Seamonkey@2.23.0",
    "type": "mozilla",
    "namespace": "",
    "name": "Seamonkey",
    "version": "2.23.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.24.0",
    "latest_non_vulnerable_version": "2.31.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61206?format=api",
            "vulnerability_id": "VCID-5wtn-t32h-xyg7",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6672.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76105",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76044",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76047",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7608",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7606",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76093",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76107",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76132",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00931",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76108",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6672"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039427",
                    "reference_id": "1039427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039427"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672",
                    "reference_id": "CVE-2013-6672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-112",
                    "reference_id": "mfsa2013-112",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-112"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-6672"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5wtn-t32h-xyg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61199?format=api",
            "vulnerability_id": "VCID-62px-695g-57bk",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5613.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93445",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93411",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93418",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93426",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93427",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93435",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93438",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93444",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5613"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429",
                    "reference_id": "1039429",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039429"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613",
                    "reference_id": "CVE-2013-5613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-114",
                    "reference_id": "mfsa2013-114",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-114"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812",
                    "reference_id": "RHSA-2013:1812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1812"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823",
                    "reference_id": "RHSA-2013:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1823"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5613"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-62px-695g-57bk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61205?format=api",
            "vulnerability_id": "VCID-69g6-8d1a-kubz",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6671.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6671",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93214",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93187",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93196",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.932",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93197",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93206",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9321",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93215",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10399",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93212",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6671"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426",
                    "reference_id": "1039426",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039426"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671",
                    "reference_id": "CVE-2013-6671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-111",
                    "reference_id": "mfsa2013-111",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-111"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812",
                    "reference_id": "RHSA-2013:1812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1812"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823",
                    "reference_id": "RHSA-2013:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1823"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-6671"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69g6-8d1a-kubz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35826?format=api",
            "vulnerability_id": "VCID-6qse-ddhe-f7ea",
            "summary": "Two vulnerabilities have been discovered in libjpeg-turbo, the\n    worse of which could allow remote attackers access to  sensitive\n    information.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6629.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6629.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43451",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43386",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43497",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43466",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43448",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43475",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43413",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43464",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0021",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43479",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2931"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6622"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6624"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6626"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6627"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6628"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6631"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6802"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031734",
                    "reference_id": "1031734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1031734"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729867",
                    "reference_id": "729867",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729867"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729873",
                    "reference_id": "729873",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=729873"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201606-03",
                    "reference_id": "GLSA-201606-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201606-03"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-116",
                    "reference_id": "mfsa2013-116",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-116"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1803",
                    "reference_id": "RHSA-2013:1803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1804",
                    "reference_id": "RHSA-2013:1804",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1804"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0412",
                    "reference_id": "RHSA-2014:0412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0413",
                    "reference_id": "RHSA-2014:0413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0413"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0486",
                    "reference_id": "RHSA-2014:0486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0508",
                    "reference_id": "RHSA-2014:0508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0509",
                    "reference_id": "RHSA-2014:0509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0705",
                    "reference_id": "RHSA-2014:0705",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0705"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0982",
                    "reference_id": "RHSA-2014:0982",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0982"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2060-1/",
                    "reference_id": "USN-2060-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2060-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-6629"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6qse-ddhe-f7ea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61203?format=api",
            "vulnerability_id": "VCID-b2k8-kjmq-1kh4",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5618.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5618",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93207",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93179",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93193",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93191",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93199",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93204",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93208",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.10378",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93206",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5618"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423",
                    "reference_id": "1039423",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039423"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618",
                    "reference_id": "CVE-2013-5618",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-109",
                    "reference_id": "mfsa2013-109",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-109"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812",
                    "reference_id": "RHSA-2013:1812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1812"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823",
                    "reference_id": "RHSA-2013:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1823"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5618"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2k8-kjmq-1kh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61207?format=api",
            "vulnerability_id": "VCID-cnc6-yyk1-zqc3",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6673.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67776",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.677",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67734",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67755",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67735",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67801",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67824",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00545",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6781",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6673"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039428",
                    "reference_id": "1039428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039428"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673",
                    "reference_id": "CVE-2013-6673",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-113",
                    "reference_id": "mfsa2013-113",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-113"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-6673"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cnc6-yyk1-zqc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61202?format=api",
            "vulnerability_id": "VCID-db94-kcvc-zybp",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86212",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86221",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86239",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8624",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86259",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86284",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02874",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86282",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5616"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422",
                    "reference_id": "1039422",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039422"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616",
                    "reference_id": "CVE-2013-5616",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-108",
                    "reference_id": "mfsa2013-108",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812",
                    "reference_id": "RHSA-2013:1812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1812"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823",
                    "reference_id": "RHSA-2013:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1823"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5616"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-db94-kcvc-zybp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61198?format=api",
            "vulnerability_id": "VCID-gsx1-3jjx-nqan",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5612.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72904",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72842",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72849",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72869",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72844",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72882",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72896",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00739",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72921",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5612"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420",
                    "reference_id": "1039420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039420"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612",
                    "reference_id": "CVE-2013-5612",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-106",
                    "reference_id": "mfsa2013-106",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-106"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812",
                    "reference_id": "RHSA-2013:1812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1812"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823",
                    "reference_id": "RHSA-2013:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1823"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5612"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gsx1-3jjx-nqan"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61204?format=api",
            "vulnerability_id": "VCID-k1sx-wcjc-jqcr",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5619.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5619",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82454",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82381",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82396",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82413",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8241",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82438",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82445",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82464",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0173",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82459",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5619"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039424",
                    "reference_id": "1039424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039424"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619",
                    "reference_id": "CVE-2013-5619",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-110",
                    "reference_id": "mfsa2013-110",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-110"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5619"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k1sx-wcjc-jqcr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61196?format=api",
            "vulnerability_id": "VCID-vg9h-jcc1-9qeg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5609.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5609",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85941",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85952",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85968",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85967",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85986",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85996",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8601",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02752",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86008",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5609"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417",
                    "reference_id": "1039417",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039417"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609",
                    "reference_id": "CVE-2013-5609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-104",
                    "reference_id": "mfsa2013-104",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-104"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812",
                    "reference_id": "RHSA-2013:1812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1812"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823",
                    "reference_id": "RHSA-2013:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1823"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5609"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vg9h-jcc1-9qeg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61200?format=api",
            "vulnerability_id": "VCID-vhq8-wmxx-wqgt",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5614.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51323",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51227",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51278",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51303",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51263",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51318",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51315",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51358",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00279",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51337",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5614"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421",
                    "reference_id": "1039421",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039421"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614",
                    "reference_id": "CVE-2013-5614",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-107",
                    "reference_id": "mfsa2013-107",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-107"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1812",
                    "reference_id": "RHSA-2013:1812",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1812"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1823",
                    "reference_id": "RHSA-2013:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1823"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5614"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhq8-wmxx-wqgt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61201?format=api",
            "vulnerability_id": "VCID-yv1t-4nze-rqf6",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5615.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83714",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83648",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83661",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83676",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83678",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83702",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83709",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83725",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83718",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5615"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039430",
                    "reference_id": "1039430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1039430"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615",
                    "reference_id": "CVE-2013-5615",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-115",
                    "reference_id": "mfsa2013-115",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-115"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2052-1/",
                    "reference_id": "USN-2052-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2052-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2053-1/",
                    "reference_id": "USN-2053-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2053-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86502?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.23.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
                }
            ],
            "aliases": [
                "CVE-2013-5615"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yv1t-4nze-rqf6"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.23.0"
}