Lookup for vulnerable packages by Package URL.

GET /api/packages/86571?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
    "purl": "pkg:mozilla/Firefox@3.0.18",
    "type": "mozilla",
    "namespace": "",
    "name": "Firefox",
    "version": "3.0.18",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "3.0.19",
    "latest_non_vulnerable_version": "150.0.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53089?format=api",
            "vulnerability_id": "VCID-89ja-f5vc-83d3",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0159.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0159.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85299",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85209",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8522",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85239",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85241",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85263",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85271",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85285",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85283",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85301",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02476",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85302",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0159"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=566047",
                    "reference_id": "566047",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566047"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159",
                    "reference_id": "CVE-2010-0159",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-01",
                    "reference_id": "mfsa2010-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0112",
                    "reference_id": "RHSA-2010:0112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0113",
                    "reference_id": "RHSA-2010:0113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/895-1/",
                    "reference_id": "USN-895-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/895-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/896-1/",
                    "reference_id": "USN-896-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/896-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
                    "purl": "pkg:mozilla/Firefox@3.0.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86570?format=api",
                    "purl": "pkg:mozilla/Firefox@3.5.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86588?format=api",
                    "purl": "pkg:mozilla/Firefox@3.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.0"
                }
            ],
            "aliases": [
                "CVE-2010-0159"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89ja-f5vc-83d3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52568?format=api",
            "vulnerability_id": "VCID-8kzv-qk9n-9ydf",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1571.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1571.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1571",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91553",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91491",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91498",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91504",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91512",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91525",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91531",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91536",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91538",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91535",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91558",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1571"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=566050",
                    "reference_id": "566050",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566050"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571",
                    "reference_id": "CVE-2009-1571",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-03",
                    "reference_id": "mfsa2010-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0112",
                    "reference_id": "RHSA-2010:0112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0113",
                    "reference_id": "RHSA-2010:0113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/895-1/",
                    "reference_id": "USN-895-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/895-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/896-1/",
                    "reference_id": "USN-896-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/896-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
                    "purl": "pkg:mozilla/Firefox@3.0.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86570?format=api",
                    "purl": "pkg:mozilla/Firefox@3.5.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86588?format=api",
                    "purl": "pkg:mozilla/Firefox@3.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.0"
                }
            ],
            "aliases": [
                "CVE-2009-1571"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8kzv-qk9n-9ydf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53084?format=api",
            "vulnerability_id": "VCID-u6m8-5huu-2baq",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3988.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3988.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3988",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60626",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60469",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60544",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60571",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6054",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60589",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60605",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60629",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60614",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60634",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00398",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60639",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3988"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=566051",
                    "reference_id": "566051",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566051"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988",
                    "reference_id": "CVE-2009-3988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-04",
                    "reference_id": "mfsa2010-04",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-04"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0112",
                    "reference_id": "RHSA-2010:0112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0112"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/895-1/",
                    "reference_id": "USN-895-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/895-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/896-1/",
                    "reference_id": "USN-896-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/896-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
                    "purl": "pkg:mozilla/Firefox@3.0.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86570?format=api",
                    "purl": "pkg:mozilla/Firefox@3.5.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86588?format=api",
                    "purl": "pkg:mozilla/Firefox@3.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.0"
                }
            ],
            "aliases": [
                "CVE-2009-3988"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u6m8-5huu-2baq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53228?format=api",
            "vulnerability_id": "VCID-usb1-ure3-77ft",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0171",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66873",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6677",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66807",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66856",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66869",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66889",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66875",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66876",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00521",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6689",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0171"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=576696",
                    "reference_id": "576696",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171",
                    "reference_id": "CVE-2010-0171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-12",
                    "reference_id": "mfsa2010-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0112",
                    "reference_id": "RHSA-2010:0112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0113",
                    "reference_id": "RHSA-2010:0113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
                    "purl": "pkg:mozilla/Firefox@3.0.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86570?format=api",
                    "purl": "pkg:mozilla/Firefox@3.5.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86556?format=api",
                    "purl": "pkg:mozilla/Firefox@3.6.2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"
                }
            ],
            "aliases": [
                "CVE-2010-0171"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-usb1-ure3-77ft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53117?format=api",
            "vulnerability_id": "VCID-xav9-5vp3-q3g2",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0165",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87623",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87556",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87566",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87579",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87581",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.876",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87606",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87618",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87613",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8761",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87625",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87626",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0165"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165",
                    "reference_id": "CVE-2010-0165",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-11",
                    "reference_id": "mfsa2010-11",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-11"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
                    "purl": "pkg:mozilla/Firefox@3.0.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86570?format=api",
                    "purl": "pkg:mozilla/Firefox@3.5.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86556?format=api",
                    "purl": "pkg:mozilla/Firefox@3.6.2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"
                }
            ],
            "aliases": [
                "CVE-2010-0165"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xav9-5vp3-q3g2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53099?format=api",
            "vulnerability_id": "VCID-xpj2-rbe9-vbe2",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0162.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0162.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0162",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74374",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74289",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74294",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74322",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74295",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74328",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74343",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74364",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74344",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74336",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74372",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00817",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74381",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0162"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=566052",
                    "reference_id": "566052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=566052"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162",
                    "reference_id": "CVE-2010-0162",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-05",
                    "reference_id": "mfsa2010-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0112",
                    "reference_id": "RHSA-2010:0112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0112"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/895-1/",
                    "reference_id": "USN-895-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/895-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/896-1/",
                    "reference_id": "USN-896-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/896-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
                    "purl": "pkg:mozilla/Firefox@3.0.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86570?format=api",
                    "purl": "pkg:mozilla/Firefox@3.5.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86588?format=api",
                    "purl": "pkg:mozilla/Firefox@3.6.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.0"
                }
            ],
            "aliases": [
                "CVE-2010-0162"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpj2-rbe9-vbe2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53181?format=api",
            "vulnerability_id": "VCID-y1cq-jzte-p3hq",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62216",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62067",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62127",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62159",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62177",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62195",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62212",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62202",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62182",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62225",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00424",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62232",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0169"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=576694",
                    "reference_id": "576694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=576694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169",
                    "reference_id": "CVE-2010-0169",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-14",
                    "reference_id": "mfsa2010-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-14"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0112",
                    "reference_id": "RHSA-2010:0112",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0112"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0113",
                    "reference_id": "RHSA-2010:0113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0113"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0153",
                    "reference_id": "RHSA-2010:0153",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0153"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2010:0154",
                    "reference_id": "RHSA-2010:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2010:0154"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86571?format=api",
                    "purl": "pkg:mozilla/Firefox@3.0.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86570?format=api",
                    "purl": "pkg:mozilla/Firefox@3.5.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86556?format=api",
                    "purl": "pkg:mozilla/Firefox@3.6.2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"
                }
            ],
            "aliases": [
                "CVE-2010-0169"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1cq-jzte-p3hq"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"
}