Lookup for vulnerable packages by Package URL.

GET /api/packages/86540?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
    "purl": "pkg:mozilla/Seamonkey@2.21.0",
    "type": "mozilla",
    "namespace": "",
    "name": "Seamonkey",
    "version": "2.21.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.22.0",
    "latest_non_vulnerable_version": "2.31.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63540?format=api",
            "vulnerability_id": "VCID-1wj7-7cne-hugr",
            "summary": "Security researcher Alex Chapman reported that the Almost\nNative Graphics Layer Engine (ANGLE) library used by Mozilla is vulnerable to an\ninteger overflow. This vulnerability is present because of insufficient bounds\nchecking in the drawLineLoop function, which can be driven by web\ncontent to overflow allocated memory, leading to a potentially exploitable\ncrash.\nIn general this flaw cannot be exploited through email in the\nThunderbird product because scripting is disabled, but is potentially a risk in\nbrowser or browser-like contexts.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1721.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1721.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75549",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75459",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75462",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75493",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75473",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75516",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75525",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75545",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75523",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75514",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75556",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00889",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75562",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1721"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009213",
                    "reference_id": "1009213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009213"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721",
                    "reference_id": "CVE-2013-1721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-78",
                    "reference_id": "mfsa2013-78",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-78"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1721"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1wj7-7cne-hugr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46467?format=api",
            "vulnerability_id": "VCID-2stf-rr9y-d3d1",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81488",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81382",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81391",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81413",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81441",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81446",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81468",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81455",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81485",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01556",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81487",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009031",
                    "reference_id": "1009031",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009031"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-76",
                    "reference_id": "mfsa2013-76",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-76"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268",
                    "reference_id": "RHSA-2013:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269",
                    "reference_id": "RHSA-2013:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1269"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1718"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2stf-rr9y-d3d1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46474?format=api",
            "vulnerability_id": "VCID-4mu8-e76c-kyeh",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1723.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1723.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82802",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82695",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82712",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82721",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82747",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82754",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8277",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82764",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8276",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01795",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82799",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1723"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009214",
                    "reference_id": "1009214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009214"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723",
                    "reference_id": "CVE-2013-1723",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-80",
                    "reference_id": "mfsa2013-80",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-80"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1723"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4mu8-e76c-kyeh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46484?format=api",
            "vulnerability_id": "VCID-9c5k-2ftn-gqbg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1732.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1732.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96917",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96871",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96878",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96883",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96888",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96896",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96897",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.969",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96901",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96902",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96909",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.33161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96914",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009037",
                    "reference_id": "1009037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009037"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-89",
                    "reference_id": "mfsa2013-89",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-89"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268",
                    "reference_id": "RHSA-2013:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269",
                    "reference_id": "RHSA-2013:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1269"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1732"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9c5k-2ftn-gqbg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46481?format=api",
            "vulnerability_id": "VCID-b5rm-htak-byga",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1730.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1730.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72678",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72587",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72595",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72611",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72588",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72627",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72639",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72661",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72644",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72634",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72675",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00729",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72686",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009036",
                    "reference_id": "1009036",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009036"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-88",
                    "reference_id": "mfsa2013-88",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-88"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268",
                    "reference_id": "RHSA-2013:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269",
                    "reference_id": "RHSA-2013:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1269"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1730"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b5rm-htak-byga"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46477?format=api",
            "vulnerability_id": "VCID-bdbv-4v22-27gs",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28797",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28899",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28974",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29024",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28831",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28898",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28939",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28943",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.289",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2885",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28872",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28848",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1726"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726",
                    "reference_id": "CVE-2013-1726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1726"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-83",
                    "reference_id": "mfsa2013-83",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-83"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1726"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bdbv-4v22-27gs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46487?format=api",
            "vulnerability_id": "VCID-h2ba-gpbd-fqfd",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1735.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1735.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89141",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89076",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89085",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.891",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89103",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8912",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89126",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89133",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89131",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89144",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009039",
                    "reference_id": "1009039",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009039"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-90",
                    "reference_id": "mfsa2013-90",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-90"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268",
                    "reference_id": "RHSA-2013:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269",
                    "reference_id": "RHSA-2013:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1269"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1735"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ba-gpbd-fqfd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46475?format=api",
            "vulnerability_id": "VCID-kb3u-p728-83en",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1724.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1724.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88946",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88883",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88891",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88906",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88908",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88927",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88932",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88943",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88938",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88951",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88949",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1724"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009216",
                    "reference_id": "1009216",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009216"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724",
                    "reference_id": "CVE-2013-1724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-81",
                    "reference_id": "mfsa2013-81",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-81"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1724"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kb3u-p728-83en"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46476?format=api",
            "vulnerability_id": "VCID-nfqd-hm51-mbbd",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1725.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1725.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86256",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86178",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86188",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86201",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86202",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86221",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86246",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86244",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8624",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86257",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02856",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86262",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009033",
                    "reference_id": "1009033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009033"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-82",
                    "reference_id": "mfsa2013-82",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-82"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268",
                    "reference_id": "RHSA-2013:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269",
                    "reference_id": "RHSA-2013:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1269"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1725"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nfqd-hm51-mbbd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46472?format=api",
            "vulnerability_id": "VCID-nn8u-pnsy-3ff4",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88235",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88163",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88171",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88187",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88193",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88212",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88218",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88229",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03865",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88222",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009032",
                    "reference_id": "1009032",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009032"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-79",
                    "reference_id": "mfsa2013-79",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-79"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268",
                    "reference_id": "RHSA-2013:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269",
                    "reference_id": "RHSA-2013:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1269"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1722"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nn8u-pnsy-3ff4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46490?format=api",
            "vulnerability_id": "VCID-r6cj-4sj2-fyfc",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1738.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1738.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89271",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89215",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89221",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89236",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89238",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89256",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89261",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8927",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89266",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89263",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04616",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89276",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1738"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009219",
                    "reference_id": "1009219",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009219"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738",
                    "reference_id": "CVE-2013-1738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-92",
                    "reference_id": "mfsa2013-92",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-92"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1738"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6cj-4sj2-fyfc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46469?format=api",
            "vulnerability_id": "VCID-s1xx-mnsy-4bbm",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1720.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1720.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85871",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85783",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85796",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85814",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85819",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85837",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85847",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85862",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8586",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85855",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85874",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02687",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85878",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1720"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009212",
                    "reference_id": "1009212",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009212"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720",
                    "reference_id": "CVE-2013-1720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-77",
                    "reference_id": "mfsa2013-77",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-77"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1720"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s1xx-mnsy-4bbm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46478?format=api",
            "vulnerability_id": "VCID-t5pz-h3w5-rbe6",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1728.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1728.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77775",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77687",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77721",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77704",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77732",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77737",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77747",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77746",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77783",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77782",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1728"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009217",
                    "reference_id": "1009217",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009217"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728",
                    "reference_id": "CVE-2013-1728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-85",
                    "reference_id": "mfsa2013-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-85"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1728"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t5pz-h3w5-rbe6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46489?format=api",
            "vulnerability_id": "VCID-v49v-hsce-audp",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, some of which may allow a remote user to\n    execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1737.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1737.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61822",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61664",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61768",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61738",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61787",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61802",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61823",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6181",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61791",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61834",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00418",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61839",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009041",
                    "reference_id": "1009041",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1009041"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201309-23",
                    "reference_id": "GLSA-201309-23",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201309-23"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-91",
                    "reference_id": "mfsa2013-91",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2013-91"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1268",
                    "reference_id": "RHSA-2013:1268",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1268"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1269",
                    "reference_id": "RHSA-2013:1269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1269"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1951-1/",
                    "reference_id": "USN-1951-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1951-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1952-1/",
                    "reference_id": "USN-1952-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1952-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86540?format=api",
                    "purl": "pkg:mozilla/Seamonkey@2.21.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
                }
            ],
            "aliases": [
                "CVE-2013-1737"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v49v-hsce-audp"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Seamonkey@2.21.0"
}