Lookup for vulnerable packages by Package URL.

GET /api/packages/922212?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "firefox-esr",
    "version": "115.9.0esr-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "115.9.1esr-1~deb11u1",
    "latest_non_vulnerable_version": "140.9.1esr-1~deb13u1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46594?format=api",
            "vulnerability_id": "VCID-2tts-gwgd-zqcz",
            "summary": "A vulnerability has been discovered in NSS, which can lead to the recovery of private data.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5388.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39691",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47677",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47794",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47739",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47752",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47727",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47732",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00245",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47729",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284",
                    "reference_id": "1056284",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056284"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243644",
                    "reference_id": "2243644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243644"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202508-04",
                    "reference_id": "GLSA-202508-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202508-04"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0093",
                    "reference_id": "RHSA-2024:0093",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0093"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0105",
                    "reference_id": "RHSA-2024:0105",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0105"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0106",
                    "reference_id": "RHSA-2024:0106",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0106"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0107",
                    "reference_id": "RHSA-2024:0107",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0107"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0108",
                    "reference_id": "RHSA-2024:0108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780432",
                    "reference_id": "show_bug.cgi?id=1780432",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:53:28Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780432"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6703-1/",
                    "reference_id": "USN-6703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6727-1/",
                    "reference_id": "USN-6727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-5388"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2tts-gwgd-zqcz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62634?format=api",
            "vulnerability_id": "VCID-3vbp-2h4f-7bav",
            "summary": "A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2611.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46877",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00238",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46894",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5538",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55402",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55397",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55362",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55391",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55392",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55341",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270664",
                    "reference_id": "2270664",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270664"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1876675",
                    "reference_id": "show_bug.cgi?id=1876675",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T15:54:02Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1876675"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6703-1/",
                    "reference_id": "USN-6703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2611"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vbp-2h4f-7bav"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62637?format=api",
            "vulnerability_id": "VCID-41g2-dvb2-yqhg",
            "summary": "Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2614.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80734",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80699",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80649",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80704",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80694",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80666",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80671",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80707",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01437",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80721",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270666",
                    "reference_id": "2270666",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270666"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093",
                    "reference_id": "buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685358%2C1861016%2C1880405%2C1881093"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-01T19:43:41Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6703-1/",
                    "reference_id": "USN-6703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2614"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-41g2-dvb2-yqhg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44219?format=api",
            "vulnerability_id": "VCID-46cy-x3cp-tke5",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0743.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76074",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76033",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76039",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76037",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76023",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76011",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76062",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260012",
                    "reference_id": "2260012",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260012"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202402-26",
                    "reference_id": "GLSA-202402-26",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202402-26"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01",
                    "reference_id": "mfsa2024-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-01"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-01/",
                    "reference_id": "mfsa2024-01",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-01/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html",
                    "reference_id": "msg00010.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00010.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867408",
                    "reference_id": "show_bug.cgi?id=1867408",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-09T23:30:55Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1867408"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6610-1/",
                    "reference_id": "USN-6610-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6610-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-0743"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46cy-x3cp-tke5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62635?format=api",
            "vulnerability_id": "VCID-b5y9-qmw5-nkbv",
            "summary": "If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2612.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78349",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01138",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7838",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81347",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81361",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81377",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81339",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81341",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81335",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01536",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81307",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270665",
                    "reference_id": "2270665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270665"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879444",
                    "reference_id": "show_bug.cgi?id=1879444",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-21T16:02:53Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879444"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6703-1/",
                    "reference_id": "USN-6703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2612"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b5y9-qmw5-nkbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62632?format=api",
            "vulnerability_id": "VCID-g24d-23zk-6fgn",
            "summary": "AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2608.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0016",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36956",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40919",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40902",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40896",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40847",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40907",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0019",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40864",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270661",
                    "reference_id": "2270661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270661"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880692",
                    "reference_id": "show_bug.cgi?id=1880692",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-20T14:26:34Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880692"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6703-1/",
                    "reference_id": "USN-6703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2608"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g24d-23zk-6fgn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62631?format=api",
            "vulnerability_id": "VCID-n8gb-hpjb-v7a5",
            "summary": "Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2607.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80832",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80795",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80817",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80801",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80746",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80766",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80792",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01453",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80764",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270660",
                    "reference_id": "2270660",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270660"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879939",
                    "reference_id": "show_bug.cgi?id=1879939",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-19T14:52:58Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1879939"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6703-1/",
                    "reference_id": "USN-6703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2607"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n8gb-hpjb-v7a5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62633?format=api",
            "vulnerability_id": "VCID-pse8-xnc7-gkbv",
            "summary": "Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2610.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39199",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39221",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47011",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47038",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47074",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47018",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47013",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47016",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00239",
                            "scoring_system": "epss",
                            "scoring_elements": "0.46961",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270663",
                    "reference_id": "2270663",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270663"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-12"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-12/",
                    "reference_id": "mfsa2024-12",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-12/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1492",
                    "reference_id": "RHSA-2024:1492",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1492"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1493",
                    "reference_id": "RHSA-2024:1493",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1493"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1494",
                    "reference_id": "RHSA-2024:1494",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1494"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1495",
                    "reference_id": "RHSA-2024:1495",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1495"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1496",
                    "reference_id": "RHSA-2024:1496",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1496"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1497",
                    "reference_id": "RHSA-2024:1497",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1497"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1498",
                    "reference_id": "RHSA-2024:1498",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1498"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1499",
                    "reference_id": "RHSA-2024:1499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1499"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1500",
                    "reference_id": "RHSA-2024:1500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1500"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112",
                    "reference_id": "show_bug.cgi?id=1871112",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-18T14:53:51Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871112"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6703-1/",
                    "reference_id": "USN-6703-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6703-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2610"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pse8-xnc7-gkbv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62639?format=api",
            "vulnerability_id": "VCID-vcf2-b7mj-tfg4",
            "summary": "To harden ICU against exploitation, the behavior for out-of-memory conditions was changed to crash instead of attempt to continue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2616.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2616.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12433",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12658",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12609",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12641",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1259",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12512",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.127",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12529",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00041",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12568",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2616"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270662",
                    "reference_id": "2270662",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270662"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-13"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-13/",
                    "reference_id": "mfsa2024-13",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-13/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-14"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-14/",
                    "reference_id": "mfsa2024-14",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-14/"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html",
                    "reference_id": "msg00022.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00022.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html",
                    "reference_id": "msg00028.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00028.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1483",
                    "reference_id": "RHSA-2024:1483",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1483"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1484",
                    "reference_id": "RHSA-2024:1484",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1484"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1485",
                    "reference_id": "RHSA-2024:1485",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1485"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1486",
                    "reference_id": "RHSA-2024:1486",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1486"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1487",
                    "reference_id": "RHSA-2024:1487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1487"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1488",
                    "reference_id": "RHSA-2024:1488",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1488"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1489",
                    "reference_id": "RHSA-2024:1489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1489"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1490",
                    "reference_id": "RHSA-2024:1490",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1490"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1491",
                    "reference_id": "RHSA-2024:1491",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1491"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197",
                    "reference_id": "show_bug.cgi?id=1846197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-19T14:53:47Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1846197"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6717-1/",
                    "reference_id": "USN-6717-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6717-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922211?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922210?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/922212?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.9.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582079?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.14.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582080?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@128.14.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582081?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582082?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1059612?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-2616"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vcf2-b7mj-tfg4"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@115.9.0esr-1%3Fdistro=trixie"
}