Lookup for vulnerable packages by Package URL.

GET /api/packages/86642?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
    "purl": "pkg:mozilla/Thunderbird@12.0.0",
    "type": "mozilla",
    "namespace": "",
    "name": "Thunderbird",
    "version": "12.0.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "13.0.0",
    "latest_non_vulnerable_version": "150.0.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49228?format=api",
            "vulnerability_id": "VCID-1zkd-zp3h-eyfn",
            "summary": "Multiple vulnerabilities have been reported in Chromium and V8,\n    some of which may allow execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3062.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3062",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85076",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84954",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84968",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84985",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8499",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85012",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85019",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85035",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85034",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8503",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85051",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85054",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3062"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815042",
                    "reference_id": "815042",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062",
                    "reference_id": "CVE-2011-3062",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201203-24",
                    "reference_id": "GLSA-201203-24",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201203-24"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-31",
                    "reference_id": "mfsa2012-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2011-3062"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zkd-zp3h-eyfn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55184?format=api",
            "vulnerability_id": "VCID-7zwg-29p1-17ds",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0477.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0477.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72588",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72463",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72513",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72504",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72556",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72545",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0477"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815026",
                    "reference_id": "815026",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815026"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477",
                    "reference_id": "CVE-2012-0477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-29",
                    "reference_id": "mfsa2012-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-29"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0477"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7zwg-29p1-17ds"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63587?format=api",
            "vulnerability_id": "VCID-8sq7-89sv-ykad",
            "summary": "Security research firm iDefense reported that researcher\nwushi of team509 discovered a memory corruption on Windows\nVista and Windows 7 systems with hardware acceleration disabled or using\nincompatible video drivers. This is created by using cairo-dwrite to attempt to\nrender fonts on an unsupported code path. This corruption causes a potentially\nexploitable crash on affected systems.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0472.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0472.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0472",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81342",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81218",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81227",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8125",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81249",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81277",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81282",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81303",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81289",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81281",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81318",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01525",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8132",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0472"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815022",
                    "reference_id": "815022",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815022"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472",
                    "reference_id": "CVE-2012-0472",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-25",
                    "reference_id": "mfsa2012-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-25"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0472"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8sq7-89sv-ykad"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55148?format=api",
            "vulnerability_id": "VCID-9rkg-yu78-aybg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0468.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0468.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85281",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85167",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85178",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85196",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85198",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8522",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85228",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85243",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8524",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85236",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85257",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02458",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85258",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0468"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815000",
                    "reference_id": "815000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468",
                    "reference_id": "CVE-2012-0468",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-20",
                    "reference_id": "mfsa2012-20",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-20"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0468"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9rkg-yu78-aybg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55157?format=api",
            "vulnerability_id": "VCID-c3tr-d7n7-zyhd",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0469.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0469.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93535",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93519",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11376",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93528",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94988",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94992",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94994",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94996",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95005",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95009",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95012",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94975",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94984",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0469"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815019",
                    "reference_id": "815019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815019"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469",
                    "reference_id": "CVE-2012-0469",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-22",
                    "reference_id": "mfsa2012-22",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-22"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0469"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c3tr-d7n7-zyhd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55171?format=api",
            "vulnerability_id": "VCID-gfdq-tc9r-cqhg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0474.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0474.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0474",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71741",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71624",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71631",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71649",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71621",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71661",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71672",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71696",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71679",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7166",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71704",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71711",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00685",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71692",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0474"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815024",
                    "reference_id": "815024",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815024"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474",
                    "reference_id": "CVE-2012-0474",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-27",
                    "reference_id": "mfsa2012-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-27"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0474"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gfdq-tc9r-cqhg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55166?format=api",
            "vulnerability_id": "VCID-gw7m-z4bd-xkd3",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0473.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0473.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72353",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72227",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72233",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72253",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72229",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72266",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.723",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72284",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72271",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72313",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72322",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00712",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7231",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0473"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815023",
                    "reference_id": "815023",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815023"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473",
                    "reference_id": "CVE-2012-0473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-26",
                    "reference_id": "mfsa2012-26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-26"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0473"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gw7m-z4bd-xkd3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55189?format=api",
            "vulnerability_id": "VCID-k66t-arjf-duhj",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0478.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0478.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73282",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73148",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73158",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73179",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73153",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73189",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73227",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73209",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73245",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73254",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00753",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73247",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0478"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815037",
                    "reference_id": "815037",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478",
                    "reference_id": "CVE-2012-0478",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-30",
                    "reference_id": "mfsa2012-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0478"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k66t-arjf-duhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55178?format=api",
            "vulnerability_id": "VCID-n35v-xsjf-sqcc",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0475.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0475.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52332",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52255",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52297",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52288",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52341",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52336",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52386",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5237",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52356",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52395",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.524",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00289",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52384",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0475"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815187",
                    "reference_id": "815187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815187"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475",
                    "reference_id": "CVE-2012-0475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-28",
                    "reference_id": "mfsa2012-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-28"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0475"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n35v-xsjf-sqcc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54603?format=api",
            "vulnerability_id": "VCID-s7b1-kdjr-rkaq",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "http://code.google.com/p/chromium/issues/detail?id=69187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://code.google.com/p/chromium/issues/detail?id=69187"
                },
                {
                    "reference_url": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1187.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1187.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.756",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75472",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75575",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75562",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75505",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75486",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75528",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75537",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75557",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75536",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7557",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-1187"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=624621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=624621"
                },
                {
                    "reference_url": "http://secunia.com/advisories/48972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/48972"
                },
                {
                    "reference_url": "http://secunia.com/advisories/49047",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/49047"
                },
                {
                    "reference_url": "http://secunia.com/advisories/49055",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/49055"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65951",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65951"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14369",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14369"
                },
                {
                    "reference_url": "http://www.mozilla.org/security/announce/2012/mfsa2012-32.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.mozilla.org/security/announce/2012/mfsa2012-32.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/46785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/46785"
                },
                {
                    "reference_url": "http://www.vupen.com/english/advisories/2011/0628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.vupen.com/english/advisories/2011/0628"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815187",
                    "reference_id": "815187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815187"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187",
                    "reference_id": "CVE-2011-1187",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1187",
                    "reference_id": "CVE-2011-1187",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1187"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-32",
                    "reference_id": "mfsa2012-32",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-32"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2011-1187"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s7b1-kdjr-rkaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55160?format=api",
            "vulnerability_id": "VCID-susy-jnsq-fqht",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0470.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0470.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90447",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90381",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90396",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.904",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90414",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90421",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90428",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9042",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90435",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05707",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90433",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0470"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815020",
                    "reference_id": "815020",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815020"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470",
                    "reference_id": "CVE-2012-0470",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-23",
                    "reference_id": "mfsa2012-23",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-23"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0470"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-susy-jnsq-fqht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55196?format=api",
            "vulnerability_id": "VCID-tg3e-uvm1-cbfu",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0479.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0479.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73677",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7355",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73559",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73582",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73555",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73591",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73604",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73626",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73608",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73599",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73643",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73653",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00775",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73644",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0479"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815044",
                    "reference_id": "815044",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815044"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479",
                    "reference_id": "CVE-2012-0479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-33",
                    "reference_id": "mfsa2012-33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-33"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0479"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tg3e-uvm1-cbfu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55162?format=api",
            "vulnerability_id": "VCID-wdt4-m7fr-q3hm",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0471.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0471.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72588",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72457",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72463",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72481",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72495",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72508",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72531",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72513",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72504",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72546",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72556",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00722",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72545",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0471"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=815021",
                    "reference_id": "815021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815021"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471",
                    "reference_id": "CVE-2012-0471",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201301-01",
                    "reference_id": "GLSA-201301-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201301-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-24",
                    "reference_id": "mfsa2012-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-24"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0515",
                    "reference_id": "RHSA-2012:0515",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0515"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0516",
                    "reference_id": "RHSA-2012:0516",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0516"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-1/",
                    "reference_id": "USN-1430-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1430-3/",
                    "reference_id": "USN-1430-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1430-3/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86642?format=api",
                    "purl": "pkg:mozilla/Thunderbird@12.0.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
                }
            ],
            "aliases": [
                "CVE-2012-0471"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wdt4-m7fr-q3hm"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Thunderbird@12.0.0"
}