Lookup for vulnerable packages by Package URL.

GET /api/packages/86807?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
    "type": "mozilla",
    "namespace": "",
    "name": "SeaMonkey",
    "version": "2.35.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.38.0",
    "latest_non_vulnerable_version": "2.38.0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41101?format=api",
            "vulnerability_id": "VCID-1p76-9qmf-bqgm",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2727.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2727",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77829",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7774",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77747",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77773",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77757",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77785",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7779",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77816",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77799",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77836",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01076",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77835",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2727"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236950",
                    "reference_id": "1236950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236950"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727",
                    "reference_id": "CVE-2015-2727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-60",
                    "reference_id": "mfsa2015-60",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-60"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2727"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1p76-9qmf-bqgm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51641?format=api",
            "vulnerability_id": "VCID-51hn-ab8w-c7bn",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2713.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82599",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8249",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82504",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82519",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82545",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82552",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82571",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82564",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01751",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82595",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220605",
                    "reference_id": "1220605",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220605"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-51",
                    "reference_id": "mfsa2015-51",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-51"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2713"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-51hn-ab8w-c7bn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41000?format=api",
            "vulnerability_id": "VCID-55jd-xx14-d3h3",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99128",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99115",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99116",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99118",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99122",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99123",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99124",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99125",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.80386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99126",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0802"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207086",
                    "reference_id": "1207086",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207086"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802",
                    "reference_id": "CVE-2015-0802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb",
                    "reference_id": "CVE-2015-0816;CVE-2015-0802;OSVDB-120107;OSVDB-119753",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/37958.rb"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-42",
                    "reference_id": "mfsa2015-42",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-42"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0802"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55jd-xx14-d3h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51649?format=api",
            "vulnerability_id": "VCID-55t4-7jnq-j7fx",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90339",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90283",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90286",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90299",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90318",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90325",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90333",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90332",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90326",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05614",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90342",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2716"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220607",
                    "reference_id": "1220607",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220607"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-54",
                    "reference_id": "mfsa2015-54",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-54"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1011",
                    "reference_id": "RHSA-2020:1011",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1011"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2508",
                    "reference_id": "RHSA-2020:2508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2508"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2716"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55t4-7jnq-j7fx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51632?format=api",
            "vulnerability_id": "VCID-5ead-13an-2kcs",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2711.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66827",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66723",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66761",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66787",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66758",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66807",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66822",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66842",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66828",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66796",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66829",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00519",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66843",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2711"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220603",
                    "reference_id": "1220603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220603"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711",
                    "reference_id": "CVE-2015-2711",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-49",
                    "reference_id": "mfsa2015-49",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-49"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2711"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5ead-13an-2kcs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51657?format=api",
            "vulnerability_id": "VCID-6kac-5ery-wuew",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4473.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03655",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87819",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88528",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88535",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88531",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88474",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88491",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88495",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88513",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88518",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88529",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88521",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252271",
                    "reference_id": "1252271",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252271"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-79",
                    "reference_id": "mfsa2015-79",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-79"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1682",
                    "reference_id": "RHSA-2015:1682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1682"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2712-1/",
                    "reference_id": "USN-2712-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2712-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4473"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kac-5ery-wuew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40998?format=api",
            "vulnerability_id": "VCID-7gzd-vyba-bfbs",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0799.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0799",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29035",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29125",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.292",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29252",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29063",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29126",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29168",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29173",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29127",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29075",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29104",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00108",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29081",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0799"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208731",
                    "reference_id": "1208731",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1208731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799",
                    "reference_id": "CVE-2015-0799",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-44",
                    "reference_id": "mfsa2015-44",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-44"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2557-1/",
                    "reference_id": "USN-2557-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2557-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0799"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gzd-vyba-bfbs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41112?format=api",
            "vulnerability_id": "VCID-82k6-qk5e-cuag",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2729.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2729",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61557",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61402",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61478",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61507",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61477",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61539",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61561",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61548",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61527",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61569",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00413",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61573",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2729"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236952",
                    "reference_id": "1236952",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236952"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729",
                    "reference_id": "CVE-2015-2729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-62",
                    "reference_id": "mfsa2015-62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-62"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2729"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-82k6-qk5e-cuag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51651?format=api",
            "vulnerability_id": "VCID-89pc-vcy3-tkd7",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30703",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30739",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30865",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30911",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30731",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30789",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30821",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30822",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30778",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30733",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30757",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00118",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30738",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2718"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220609",
                    "reference_id": "1220609",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220609"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718",
                    "reference_id": "CVE-2015-2718",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-56",
                    "reference_id": "mfsa2015-56",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-56"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2718"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-89pc-vcy3-tkd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41008?format=api",
            "vulnerability_id": "VCID-9n5g-6m3r-3uez",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0808.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72131",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72051",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72058",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72078",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72054",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72092",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72103",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72126",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72111",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72096",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72137",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00705",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72145",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0808"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207075",
                    "reference_id": "1207075",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207075"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808",
                    "reference_id": "CVE-2015-0808",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-36",
                    "reference_id": "mfsa2015-36",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-36"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0808"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9n5g-6m3r-3uez"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51706?format=api",
            "vulnerability_id": "VCID-drq5-6jps-skax",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88879",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88882",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88823",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88839",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88841",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88859",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88864",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88876",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04296",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88871",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4491"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252290",
                    "reference_id": "1252290",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252290"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-05",
                    "reference_id": "GLSA-201512-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-05"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-88",
                    "reference_id": "mfsa2015-88",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-88"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1682",
                    "reference_id": "RHSA-2015:1682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1694",
                    "reference_id": "RHSA-2015:1694",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1694"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2712-1/",
                    "reference_id": "USN-2712-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2712-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2722-1/",
                    "reference_id": "USN-2722-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2722-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4491"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41005?format=api",
            "vulnerability_id": "VCID-e193-1kgh-5kda",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82184",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82076",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82109",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82105",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82132",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82139",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82158",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82181",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0805"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078",
                    "reference_id": "1207078",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207078"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805",
                    "reference_id": "CVE-2015-0805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38",
                    "reference_id": "mfsa2015-38",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-38"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0805"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e193-1kgh-5kda"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63740?format=api",
            "vulnerability_id": "VCID-et32-whyj-dyev",
            "summary": "Security researcher Joshua Drake  reported potential integer overflows  in the libstagefright library while processing video sample metadata in MPEG4 video files.   This can lead to a potentially exploitable crash.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4496.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4496",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81251",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81149",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81158",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81182",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81181",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81214",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81234",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8122",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81213",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01513",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81249",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4496"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1253550",
                    "reference_id": "1253550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1253550"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496",
                    "reference_id": "CVE-2015-4496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4496"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-93",
                    "reference_id": "mfsa2015-93",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-93"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4496"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-et32-whyj-dyev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40999?format=api",
            "vulnerability_id": "VCID-ffrc-3bx6-jbav",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0801.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78867",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78795",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78802",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78832",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78815",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7884",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78846",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7887",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78853",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78843",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78872",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01191",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78869",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0801"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207084",
                    "reference_id": "1207084",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207084"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-40",
                    "reference_id": "mfsa2015-40",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-40"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766",
                    "reference_id": "RHSA-2015:0766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0766"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771",
                    "reference_id": "RHSA-2015:0771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0771"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2552-1/",
                    "reference_id": "USN-2552-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2552-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0801"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffrc-3bx6-jbav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60737?format=api",
            "vulnerability_id": "VCID-fnkt-es29-cuhh",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4498.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4498.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68843",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68725",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68744",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68764",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68743",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68794",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68813",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68836",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68821",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68792",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00576",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68833",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257278",
                    "reference_id": "1257278",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257278"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-95",
                    "reference_id": "mfsa2015-95",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-95"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1693",
                    "reference_id": "RHSA-2015:1693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1693"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2723-1/",
                    "reference_id": "USN-2723-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2723-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4498"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fnkt-es29-cuhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51628?format=api",
            "vulnerability_id": "VCID-ghtc-dh9g-2ufb",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2708.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79965",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79885",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79892",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79913",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79929",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79938",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79958",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79941",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79934",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01328",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79962",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220597",
                    "reference_id": "1220597",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220597"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-46",
                    "reference_id": "mfsa2015-46",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-46"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2708"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ghtc-dh9g-2ufb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41053?format=api",
            "vulnerability_id": "VCID-gr7k-2v4p-kbfg",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0816.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99367",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99359",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99361",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99363",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99364",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99365",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99366",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.8537",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99368",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0816"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207072",
                    "reference_id": "1207072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207072"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-33",
                    "reference_id": "mfsa2015-33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-33"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766",
                    "reference_id": "RHSA-2015:0766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0766"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771",
                    "reference_id": "RHSA-2015:0771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0771"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2552-1/",
                    "reference_id": "USN-2552-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2552-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0816"
            ],
            "risk_score": 1.6,
            "exploitability": "2.0",
            "weighted_severity": "0.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gr7k-2v4p-kbfg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41045?format=api",
            "vulnerability_id": "VCID-grdt-g3kf-3uh3",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0815.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79395",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79314",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79321",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79344",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7933",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79356",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79365",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79389",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79373",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79362",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79394",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01254",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79392",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207068",
                    "reference_id": "1207068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207068"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30",
                    "reference_id": "mfsa2015-30",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766",
                    "reference_id": "RHSA-2015:0766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0766"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771",
                    "reference_id": "RHSA-2015:0771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0771"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2552-1/",
                    "reference_id": "USN-2552-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2552-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0815"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-grdt-g3kf-3uh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41122?format=api",
            "vulnerability_id": "VCID-jmhk-12t1-kugh",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2730.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45529",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4544",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45514",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45536",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45537",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45538",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45558",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45527",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45533",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45581",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45578",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236954",
                    "reference_id": "1236954",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236954"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-64",
                    "reference_id": "mfsa2015-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-64"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1664",
                    "reference_id": "RHSA-2015:1664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1664"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1699",
                    "reference_id": "RHSA-2015:1699",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1699"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2672-1/",
                    "reference_id": "USN-2672-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2672-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2730"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jmhk-12t1-kugh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41010?format=api",
            "vulnerability_id": "VCID-jnj4-g593-37d7",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0811.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7348",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73385",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73394",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73417",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73389",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73426",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7344",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73463",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73443",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73435",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73478",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00765",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73487",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0811"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207073",
                    "reference_id": "1207073",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811",
                    "reference_id": "CVE-2015-0811",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-34",
                    "reference_id": "mfsa2015-34",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-34"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0811"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnj4-g593-37d7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51661?format=api",
            "vulnerability_id": "VCID-jqed-5g3b-auag",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4478.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4478.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71182",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71081",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7109",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71107",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71082",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71124",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71137",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7116",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71145",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71129",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00661",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71175",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252282",
                    "reference_id": "1252282",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252282"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-82",
                    "reference_id": "mfsa2015-82",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-82"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4478"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqed-5g3b-auag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51674?format=api",
            "vulnerability_id": "VCID-jqq7-zaqr-6bap",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4481",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37252",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37246",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37412",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37436",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37264",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37315",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37327",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37339",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37305",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37277",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37323",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37306",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4481"
                },
                {
                    "reference_url": "https://code.google.com/p/google-security-research/issues/detail?id=427&can=1",
                    "reference_id": "CVE-2015-4481",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://code.google.com/p/google-security-research/issues/detail?id=427&can=1"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481",
                    "reference_id": "CVE-2015-4481",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/37925.txt",
                    "reference_id": "CVE-2015-4481",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/local/37925.txt"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-84",
                    "reference_id": "mfsa2015-84",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-84"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4481"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqq7-zaqr-6bap"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51635?format=api",
            "vulnerability_id": "VCID-jtxv-vhm6-33h3",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2712.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2712",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88254",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88182",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8819",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88206",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88212",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88232",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88238",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88249",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88242",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88241",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03878",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88255",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2712"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220604",
                    "reference_id": "1220604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220604"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712",
                    "reference_id": "CVE-2015-2712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-50",
                    "reference_id": "mfsa2015-50",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-50"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2712"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jtxv-vhm6-33h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41130?format=api",
            "vulnerability_id": "VCID-k6eg-55x2-dyh5",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2731.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76337",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76247",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7625",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76281",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76261",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76293",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76307",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76334",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76312",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76347",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00945",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76352",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236953",
                    "reference_id": "1236953",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236953"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-63",
                    "reference_id": "mfsa2015-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-63"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455",
                    "reference_id": "RHSA-2015:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1455"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2731"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k6eg-55x2-dyh5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41161?format=api",
            "vulnerability_id": "VCID-kyhs-j9aj-vqft",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2734.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79367",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79293",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79324",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7931",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79335",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79345",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79369",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79353",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79343",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7937",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01252",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79365",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956",
                    "reference_id": "1236956",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236956"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66",
                    "reference_id": "mfsa2015-66",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-66"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455",
                    "reference_id": "RHSA-2015:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1455"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2673-1/",
                    "reference_id": "USN-2673-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2673-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2734"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kyhs-j9aj-vqft"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41090?format=api",
            "vulnerability_id": "VCID-mwyu-5rk2-xbbz",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2721.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69706",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69606",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69619",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69635",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69614",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69665",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69682",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69704",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69689",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69717",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00607",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69725",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236967",
                    "reference_id": "1236967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236967"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-46",
                    "reference_id": "GLSA-201701-46",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-46"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-71",
                    "reference_id": "mfsa2015-71",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-71"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1185",
                    "reference_id": "RHSA-2015:1185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1185"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1664",
                    "reference_id": "RHSA-2015:1664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1664"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2672-1/",
                    "reference_id": "USN-2672-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2672-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2673-1/",
                    "reference_id": "USN-2673-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2673-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2721"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mwyu-5rk2-xbbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51648?format=api",
            "vulnerability_id": "VCID-nav6-hsaf-2fbj",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2715.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80311",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80224",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80232",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80252",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8024",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80268",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80278",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80297",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80282",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80275",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80306",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80307",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2715"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220606",
                    "reference_id": "1220606",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220606"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715",
                    "reference_id": "CVE-2015-2715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-53",
                    "reference_id": "mfsa2015-53",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-53"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2715"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nav6-hsaf-2fbj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51679?format=api",
            "vulnerability_id": "VCID-nega-51gt-hqfd",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4482",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25662",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25797",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25857",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.259",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25671",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25742",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2579",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.258",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25759",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.257",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25703",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25686",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4482"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482",
                    "reference_id": "CVE-2015-4482",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-85",
                    "reference_id": "mfsa2015-85",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-85"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4482"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nega-51gt-hqfd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41003?format=api",
            "vulnerability_id": "VCID-p7k1-93e6-cfha",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82184",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82076",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82088",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82109",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82105",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82132",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82139",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82158",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82149",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01674",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82181",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0803"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207081",
                    "reference_id": "1207081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207081"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803",
                    "reference_id": "CVE-2015-0803",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-39",
                    "reference_id": "mfsa2015-39",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-39"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0803"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p7k1-93e6-cfha"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49155?format=api",
            "vulnerability_id": "VCID-pcxu-acuh-m3be",
            "summary": "A buffer overflow in GStreamer could allow remote attackers to\n    execute arbitrary code or cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0797.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91872",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91816",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91825",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91831",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91839",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91852",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91858",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91861",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91862",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91877",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07609",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91874",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220600",
                    "reference_id": "1220600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220600"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-07",
                    "reference_id": "GLSA-201512-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-07"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-47",
                    "reference_id": "mfsa2015-47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-47"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0797"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pcxu-acuh-m3be"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41094?format=api",
            "vulnerability_id": "VCID-qj59-9xmk-7yg9",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84795",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84701",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84716",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84736",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84738",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8476",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84767",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84785",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8478",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84774",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84796",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02313",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84797",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2722"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955",
                    "reference_id": "1236955",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236955"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722",
                    "reference_id": "CVE-2015-2722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65",
                    "reference_id": "mfsa2015-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-65"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2722"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qj59-9xmk-7yg9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41064?format=api",
            "vulnerability_id": "VCID-qny5-vvv5-q7f4",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2706.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78369",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7829",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78296",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78327",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78309",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78335",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78368",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78351",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78344",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78373",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78372",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2706"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213935",
                    "reference_id": "1213935",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213935"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706",
                    "reference_id": "CVE-2015-2706",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-45",
                    "reference_id": "mfsa2015-45",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-45"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2571-1/",
                    "reference_id": "USN-2571-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2571-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2706"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qny5-vvv5-q7f4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54341?format=api",
            "vulnerability_id": "VCID-qynw-zxy1-qqfh",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63076",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63053",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63097",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63011",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63041",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63005",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63056",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63072",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63089",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63075",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-57",
                    "reference_id": "mfsa2015-57",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-57"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2011-3079"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qynw-zxy1-qqfh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51650?format=api",
            "vulnerability_id": "VCID-r7v8-qp3e-cua2",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85152",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85058",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85071",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85088",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85093",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85121",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85136",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85133",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85151",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85154",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2717"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220608",
                    "reference_id": "1220608",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717",
                    "reference_id": "CVE-2015-2717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-55",
                    "reference_id": "mfsa2015-55",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-55"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2717"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r7v8-qp3e-cua2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34739?format=api",
            "vulnerability_id": "VCID-rzqy-gheq-cqgg",
            "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites allowing remote attackers to remotely execute arbitrary\n    code, obtain information, and cause Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4000.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.93743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99851",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.93743",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99852",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.93894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99875",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.93894",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99876",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.939",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99875",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.939",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99877",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.939",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99874",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.939",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99873",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.939",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99876",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8873"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211",
                    "reference_id": "1223211",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1223211"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201506-02",
                    "reference_id": "GLSA-201506-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201506-02"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201603-11",
                    "reference_id": "GLSA-201603-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201603-11"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-46",
                    "reference_id": "GLSA-201701-46",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201701-46"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-70",
                    "reference_id": "mfsa2015-70",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-70"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1072",
                    "reference_id": "RHSA-2015:1072",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1072"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1185",
                    "reference_id": "RHSA-2015:1185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1185"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1197",
                    "reference_id": "RHSA-2015:1197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1228",
                    "reference_id": "RHSA-2015:1228",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1228"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1229",
                    "reference_id": "RHSA-2015:1229",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1229"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1230",
                    "reference_id": "RHSA-2015:1230",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1230"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1241",
                    "reference_id": "RHSA-2015:1241",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1241"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1242",
                    "reference_id": "RHSA-2015:1242",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1242"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1243",
                    "reference_id": "RHSA-2015:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1485",
                    "reference_id": "RHSA-2015:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1486",
                    "reference_id": "RHSA-2015:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1488",
                    "reference_id": "RHSA-2015:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1526",
                    "reference_id": "RHSA-2015:1526",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1526"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1544",
                    "reference_id": "RHSA-2015:1544",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1544"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1604",
                    "reference_id": "RHSA-2015:1604",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1604"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2056",
                    "reference_id": "RHSA-2016:2056",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2056"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2673-1/",
                    "reference_id": "USN-2673-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2673-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2696-1/",
                    "reference_id": "USN-2696-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2696-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2706-1/",
                    "reference_id": "USN-2706-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2706-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4000"
            ],
            "risk_score": 7.2,
            "exploitability": "2.0",
            "weighted_severity": "3.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzqy-gheq-cqgg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51691?format=api",
            "vulnerability_id": "VCID-s76d-pjvk-63cr",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4485.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4485",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91866",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9181",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91818",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91824",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91832",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91845",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91851",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91855",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91856",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91852",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91871",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07599",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91867",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4485"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252292",
                    "reference_id": "1252292",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252292"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485",
                    "reference_id": "CVE-2015-4485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-89",
                    "reference_id": "mfsa2015-89",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-89"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4485"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s76d-pjvk-63cr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51711?format=api",
            "vulnerability_id": "VCID-teza-m5kj-s7ac",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4492.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84772",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84677",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84692",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84712",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84714",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84736",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84743",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84761",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84757",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84751",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84773",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02306",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84774",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252295",
                    "reference_id": "1252295",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252295"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-92",
                    "reference_id": "mfsa2015-92",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-92"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4492"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teza-m5kj-s7ac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51694?format=api",
            "vulnerability_id": "VCID-tsmv-w2tb-hyht",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4487.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85846",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85754",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85767",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85785",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85791",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8581",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8582",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85835",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85832",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85828",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85847",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02676",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85851",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252293",
                    "reference_id": "1252293",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252293"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-90",
                    "reference_id": "mfsa2015-90",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-90"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1682",
                    "reference_id": "RHSA-2015:1682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1682"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2712-1/",
                    "reference_id": "USN-2712-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2712-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4487"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tsmv-w2tb-hyht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41212?format=api",
            "vulnerability_id": "VCID-ua69-cwm3-8ubh",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2741.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62294",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62147",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62207",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62237",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62204",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62254",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62271",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62289",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62279",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62257",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.62303",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00426",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6231",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2741"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236963",
                    "reference_id": "1236963",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236963"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741",
                    "reference_id": "CVE-2015-2741",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-67",
                    "reference_id": "mfsa2015-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-67"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455",
                    "reference_id": "RHSA-2015:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1455"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2741"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ua69-cwm3-8ubh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51659?format=api",
            "vulnerability_id": "VCID-ueke-9crt-qybh",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4475.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7926",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79291",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79277",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79302",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79312",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79335",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79319",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79308",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01248",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79331",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252276",
                    "reference_id": "1252276",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252276"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-80",
                    "reference_id": "mfsa2015-80",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-80"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4475"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ueke-9crt-qybh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60736?format=api",
            "vulnerability_id": "VCID-uzga-bp6y-27fy",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4497.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4497.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86687",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86613",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86624",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86644",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86642",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86661",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86671",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86684",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86682",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86675",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86688",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0304",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86695",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257276",
                    "reference_id": "1257276",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1257276"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-94",
                    "reference_id": "mfsa2015-94",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-94"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1693",
                    "reference_id": "RHSA-2015:1693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1693"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2723-1/",
                    "reference_id": "USN-2723-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2723-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4497"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzga-bp6y-27fy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51689?format=api",
            "vulnerability_id": "VCID-v3rg-mrwe-yqck",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4484.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4484.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7488",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74802",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74804",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74832",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74806",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74839",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74853",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74876",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74855",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74846",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74882",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00848",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7489",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252289",
                    "reference_id": "1252289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252289"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-87",
                    "reference_id": "mfsa2015-87",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-87"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4484"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v3rg-mrwe-yqck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41025?format=api",
            "vulnerability_id": "VCID-wh23-7b49-n3g5",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0813.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8622",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86142",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86152",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86168",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86187",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86199",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86213",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8621",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86206",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86223",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02842",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86229",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207088",
                    "reference_id": "1207088",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207088"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-31",
                    "reference_id": "mfsa2015-31",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766",
                    "reference_id": "RHSA-2015:0766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0766"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771",
                    "reference_id": "RHSA-2015:0771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0771"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2552-1/",
                    "reference_id": "USN-2552-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2552-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0813"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wh23-7b49-n3g5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51663?format=api",
            "vulnerability_id": "VCID-x2yk-hpvu-6fg6",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4479.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4479.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8462",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8452",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84535",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84556",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8456",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84581",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84588",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84607",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84602",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84598",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84617",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252285",
                    "reference_id": "1252285",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252285"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-83",
                    "reference_id": "mfsa2015-83",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-83"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586",
                    "reference_id": "RHSA-2015:1586",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1586"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2702-1/",
                    "reference_id": "USN-2702-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2702-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-4479"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x2yk-hpvu-6fg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41095?format=api",
            "vulnerability_id": "VCID-xjf8-mc7t-hfah",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2724.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75882",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75798",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75802",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75813",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75845",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75881",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75862",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75855",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75893",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75896",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947",
                    "reference_id": "1236947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236947"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59",
                    "reference_id": "mfsa2015-59",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-59"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1455",
                    "reference_id": "RHSA-2015:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1455"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2673-1/",
                    "reference_id": "USN-2673-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2673-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2724"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xjf8-mc7t-hfah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61306?format=api",
            "vulnerability_id": "VCID-xqqq-rk53-ubhp",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, and SeaMonkey, the worst of which may allow user-assisted\n    execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16138",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16083",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16099",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1608",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16264",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16325",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16208",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16275",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16256",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16216",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16149",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0833"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833",
                    "reference_id": "CVE-2015-0833",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201504-01",
                    "reference_id": "GLSA-201504-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201504-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12",
                    "reference_id": "mfsa2015-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58",
                    "reference_id": "mfsa2015-58",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-58"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86801?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.33.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.33.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0833"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqqq-rk53-ubhp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41109?format=api",
            "vulnerability_id": "VCID-xqxf-cnpj-3qas",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2728.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77778",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7769",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77697",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77707",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77735",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7774",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77751",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7775",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77786",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77785",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236951",
                    "reference_id": "1236951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1236951"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-61",
                    "reference_id": "mfsa2015-61",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-61"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1207",
                    "reference_id": "RHSA-2015:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1207"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-1/",
                    "reference_id": "USN-2656-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2656-2/",
                    "reference_id": "USN-2656-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2656-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2728"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xqxf-cnpj-3qas"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51631?format=api",
            "vulnerability_id": "VCID-xx39-5rg1-b3am",
            "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n    the worst of which may allow remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2710.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85154",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85058",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85071",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85088",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85092",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85114",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85121",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85135",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85133",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02421",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85151",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220601",
                    "reference_id": "1220601",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1220601"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201605-06",
                    "reference_id": "GLSA-201605-06",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201605-06"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-48",
                    "reference_id": "mfsa2015-48",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-48"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0988",
                    "reference_id": "RHSA-2015:0988",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0988"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1012",
                    "reference_id": "RHSA-2015:1012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1012"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2602-1/",
                    "reference_id": "USN-2602-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2602-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2603-1/",
                    "reference_id": "USN-2603-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2603-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-2710"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xx39-5rg1-b3am"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41009?format=api",
            "vulnerability_id": "VCID-yq8w-7uvd-dyhk",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60485",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60323",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60398",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60426",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60442",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60459",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60479",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60465",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60445",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60486",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00396",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60495",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0810"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810",
                    "reference_id": "CVE-2015-0810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0810"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-35",
                    "reference_id": "mfsa2015-35",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "none",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-35"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0810"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yq8w-7uvd-dyhk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41007?format=api",
            "vulnerability_id": "VCID-ys1x-t7un-ayhr",
            "summary": "Multiple vulnerabilities have been found in Mozilla Firefox and\n    Thunderbird, the worst of which may allow user-assisted execution of\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0807.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33497",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33485",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33639",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33673",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33512",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33556",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3359",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33584",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33543",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33519",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33554",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00137",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33531",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207076",
                    "reference_id": "1207076",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1207076"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201512-10",
                    "reference_id": "GLSA-201512-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201512-10"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-37",
                    "reference_id": "mfsa2015-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0766",
                    "reference_id": "RHSA-2015:0766",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0766"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0771",
                    "reference_id": "RHSA-2015:0771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0771"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2550-1/",
                    "reference_id": "USN-2550-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2550-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2552-1/",
                    "reference_id": "USN-2552-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2552-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/86807?format=api",
                    "purl": "pkg:mozilla/SeaMonkey@2.35.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
                }
            ],
            "aliases": [
                "CVE-2015-0807"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys1x-t7un-ayhr"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.35.0"
}