Lookup for vulnerable packages by Package URL.

GET /api/packages/940952?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/940952?format=api",
    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "thunderbird",
    "version": "1:128.5.0esr-1~deb12u1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1:128.5.0esr-1",
    "latest_non_vulnerable_version": "1:140.9.1esr-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41987?format=api",
            "vulnerability_id": "VCID-5j6z-g7gt-qyea",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11694.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32759",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32663",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32625",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32653",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32691",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32689",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32664",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32616",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00131",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32795",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3732",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00178",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39421",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11694"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328941",
                    "reference_id": "2328941",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328941"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202501-10",
                    "reference_id": "GLSA-202501-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202501-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-03",
                    "reference_id": "GLSA-202505-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-02",
                    "reference_id": "GLSA-202509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-65",
                    "reference_id": "mfsa2024-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-65"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-65/",
                    "reference_id": "mfsa2024-65",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-65/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-70",
                    "reference_id": "mfsa2024-70",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-70"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-70/",
                    "reference_id": "mfsa2024-70",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-70/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591",
                    "reference_id": "RHSA-2024:10591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592",
                    "reference_id": "RHSA-2024:10592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667",
                    "reference_id": "RHSA-2024:10667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702",
                    "reference_id": "RHSA-2024:10702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703",
                    "reference_id": "RHSA-2024:10703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704",
                    "reference_id": "RHSA-2024:10704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10704"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710",
                    "reference_id": "RHSA-2024:10710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733",
                    "reference_id": "RHSA-2024:10733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734",
                    "reference_id": "RHSA-2024:10734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742",
                    "reference_id": "RHSA-2024:10742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743",
                    "reference_id": "RHSA-2024:10743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745",
                    "reference_id": "RHSA-2024:10745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748",
                    "reference_id": "RHSA-2024:10748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10748"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752",
                    "reference_id": "RHSA-2024:10752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844",
                    "reference_id": "RHSA-2024:10844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848",
                    "reference_id": "RHSA-2024:10848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10848"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849",
                    "reference_id": "RHSA-2024:10849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10849"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880",
                    "reference_id": "RHSA-2024:10880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881",
                    "reference_id": "RHSA-2024:10881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10881"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167",
                    "reference_id": "show_bug.cgi?id=1924167",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:37:03Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7134-1/",
                    "reference_id": "USN-7134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7134-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7193-1/",
                    "reference_id": "USN-7193-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7193-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940802?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940953?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940952?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940954?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940800?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940804?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940803?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067638?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-11694"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5j6z-g7gt-qyea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41991?format=api",
            "vulnerability_id": "VCID-8k4z-rq29-mqg5",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11697.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22135",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2202",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22081",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22122",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22104",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22048",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21968",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22184",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22018",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00091",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25514",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00098",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26995",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11697"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11697"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328950",
                    "reference_id": "2328950",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328950"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202501-10",
                    "reference_id": "GLSA-202501-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202501-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-03",
                    "reference_id": "GLSA-202505-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-02",
                    "reference_id": "GLSA-202509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591",
                    "reference_id": "RHSA-2024:10591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592",
                    "reference_id": "RHSA-2024:10592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667",
                    "reference_id": "RHSA-2024:10667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702",
                    "reference_id": "RHSA-2024:10702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703",
                    "reference_id": "RHSA-2024:10703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704",
                    "reference_id": "RHSA-2024:10704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10704"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710",
                    "reference_id": "RHSA-2024:10710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733",
                    "reference_id": "RHSA-2024:10733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734",
                    "reference_id": "RHSA-2024:10734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742",
                    "reference_id": "RHSA-2024:10742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743",
                    "reference_id": "RHSA-2024:10743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745",
                    "reference_id": "RHSA-2024:10745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748",
                    "reference_id": "RHSA-2024:10748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10748"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752",
                    "reference_id": "RHSA-2024:10752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844",
                    "reference_id": "RHSA-2024:10844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848",
                    "reference_id": "RHSA-2024:10848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10848"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849",
                    "reference_id": "RHSA-2024:10849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10849"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880",
                    "reference_id": "RHSA-2024:10880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881",
                    "reference_id": "RHSA-2024:10881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10881"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842187",
                    "reference_id": "show_bug.cgi?id=1842187",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:26:51Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1842187"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7134-1/",
                    "reference_id": "USN-7134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7134-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940802?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940953?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940952?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940954?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940800?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940804?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940803?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067638?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-11697"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8k4z-rq29-mqg5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41988?format=api",
            "vulnerability_id": "VCID-bjny-apx2-8ba1",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11695.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32466",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32492",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3253",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32526",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32498",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3245",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32627",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0013",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32501",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37155",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00177",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39232",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11695"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11695"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328948",
                    "reference_id": "2328948",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328948"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202501-10",
                    "reference_id": "GLSA-202501-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202501-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-03",
                    "reference_id": "GLSA-202505-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-02",
                    "reference_id": "GLSA-202509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591",
                    "reference_id": "RHSA-2024:10591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592",
                    "reference_id": "RHSA-2024:10592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667",
                    "reference_id": "RHSA-2024:10667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702",
                    "reference_id": "RHSA-2024:10702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703",
                    "reference_id": "RHSA-2024:10703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704",
                    "reference_id": "RHSA-2024:10704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10704"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710",
                    "reference_id": "RHSA-2024:10710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733",
                    "reference_id": "RHSA-2024:10733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734",
                    "reference_id": "RHSA-2024:10734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742",
                    "reference_id": "RHSA-2024:10742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743",
                    "reference_id": "RHSA-2024:10743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745",
                    "reference_id": "RHSA-2024:10745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748",
                    "reference_id": "RHSA-2024:10748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10748"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752",
                    "reference_id": "RHSA-2024:10752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844",
                    "reference_id": "RHSA-2024:10844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848",
                    "reference_id": "RHSA-2024:10848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10848"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849",
                    "reference_id": "RHSA-2024:10849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10849"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880",
                    "reference_id": "RHSA-2024:10880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881",
                    "reference_id": "RHSA-2024:10881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10881"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496",
                    "reference_id": "show_bug.cgi?id=1925496",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T16:43:59Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7134-1/",
                    "reference_id": "USN-7134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7134-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940802?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940953?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940952?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940954?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940800?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940804?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940803?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067638?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-11695"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjny-apx2-8ba1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41989?format=api",
            "vulnerability_id": "VCID-dh5k-q87q-4qfs",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11696.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13839",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13713",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13762",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13799",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13831",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1378",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13698",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13896",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13625",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00056",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17549",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18978",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11696"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11696"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328943",
                    "reference_id": "2328943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328943"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202501-10",
                    "reference_id": "GLSA-202501-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202501-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-03",
                    "reference_id": "GLSA-202505-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-02",
                    "reference_id": "GLSA-202509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591",
                    "reference_id": "RHSA-2024:10591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592",
                    "reference_id": "RHSA-2024:10592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667",
                    "reference_id": "RHSA-2024:10667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702",
                    "reference_id": "RHSA-2024:10702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703",
                    "reference_id": "RHSA-2024:10703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704",
                    "reference_id": "RHSA-2024:10704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10704"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710",
                    "reference_id": "RHSA-2024:10710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733",
                    "reference_id": "RHSA-2024:10733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734",
                    "reference_id": "RHSA-2024:10734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742",
                    "reference_id": "RHSA-2024:10742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743",
                    "reference_id": "RHSA-2024:10743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745",
                    "reference_id": "RHSA-2024:10745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748",
                    "reference_id": "RHSA-2024:10748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10748"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752",
                    "reference_id": "RHSA-2024:10752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844",
                    "reference_id": "RHSA-2024:10844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848",
                    "reference_id": "RHSA-2024:10848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10848"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849",
                    "reference_id": "RHSA-2024:10849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10849"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880",
                    "reference_id": "RHSA-2024:10880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881",
                    "reference_id": "RHSA-2024:10881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10881"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929600",
                    "reference_id": "show_bug.cgi?id=1929600",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-02T17:02:13Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929600"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7134-1/",
                    "reference_id": "USN-7134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7134-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940802?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940953?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940952?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940954?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940800?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940804?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940803?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067638?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-11696"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dh5k-q87q-4qfs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41986?format=api",
            "vulnerability_id": "VCID-grjt-j4at-pqbp",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11692.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23632",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2514",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25042",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25028",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24983",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24914",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25101",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24953",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24961",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24948",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00087",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25002",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11692"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328946",
                    "reference_id": "2328946",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328946"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202501-10",
                    "reference_id": "GLSA-202501-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202501-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-03",
                    "reference_id": "GLSA-202505-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-02",
                    "reference_id": "GLSA-202509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591",
                    "reference_id": "RHSA-2024:10591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592",
                    "reference_id": "RHSA-2024:10592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667",
                    "reference_id": "RHSA-2024:10667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702",
                    "reference_id": "RHSA-2024:10702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703",
                    "reference_id": "RHSA-2024:10703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704",
                    "reference_id": "RHSA-2024:10704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10704"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710",
                    "reference_id": "RHSA-2024:10710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733",
                    "reference_id": "RHSA-2024:10733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734",
                    "reference_id": "RHSA-2024:10734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742",
                    "reference_id": "RHSA-2024:10742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743",
                    "reference_id": "RHSA-2024:10743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745",
                    "reference_id": "RHSA-2024:10745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748",
                    "reference_id": "RHSA-2024:10748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10748"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752",
                    "reference_id": "RHSA-2024:10752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844",
                    "reference_id": "RHSA-2024:10844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848",
                    "reference_id": "RHSA-2024:10848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10848"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849",
                    "reference_id": "RHSA-2024:10849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10849"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880",
                    "reference_id": "RHSA-2024:10880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881",
                    "reference_id": "RHSA-2024:10881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10881"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909535",
                    "reference_id": "show_bug.cgi?id=1909535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T15:45:17Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1909535"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7134-1/",
                    "reference_id": "USN-7134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7134-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940802?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940953?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940952?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940954?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940800?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940804?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940803?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067638?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-11692"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-grjt-j4at-pqbp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41992?format=api",
            "vulnerability_id": "VCID-w7gj-shrq-3fcz",
            "summary": "Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-11699.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26272",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26104",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26163",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26208",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26201",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26152",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26085",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26313",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.26109",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00117",
                            "scoring_system": "epss",
                            "scoring_elements": "0.30486",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32054",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-11699"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11699"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328947",
                    "reference_id": "2328947",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2328947"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911",
                    "reference_id": "buglist.cgi?bug_id=1880582%2C1929911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1880582%2C1929911"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202501-10",
                    "reference_id": "GLSA-202501-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202501-10"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202505-03",
                    "reference_id": "GLSA-202505-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202505-03"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202509-02",
                    "reference_id": "GLSA-202509-02",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202509-02"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-63"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-63/",
                    "reference_id": "mfsa2024-63",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-63/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-64"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-64/",
                    "reference_id": "mfsa2024-64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-64/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-67"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-67/",
                    "reference_id": "mfsa2024-67",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-67/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2024-68"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2024-68/",
                    "reference_id": "mfsa2024-68",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-27T15:00:52Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2024-68/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10591",
                    "reference_id": "RHSA-2024:10591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10592",
                    "reference_id": "RHSA-2024:10592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10667",
                    "reference_id": "RHSA-2024:10667",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10667"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10702",
                    "reference_id": "RHSA-2024:10702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10703",
                    "reference_id": "RHSA-2024:10703",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10703"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10704",
                    "reference_id": "RHSA-2024:10704",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10704"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10710",
                    "reference_id": "RHSA-2024:10710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10710"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10733",
                    "reference_id": "RHSA-2024:10733",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10733"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10734",
                    "reference_id": "RHSA-2024:10734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10742",
                    "reference_id": "RHSA-2024:10742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10742"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10743",
                    "reference_id": "RHSA-2024:10743",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10743"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10745",
                    "reference_id": "RHSA-2024:10745",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10745"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10748",
                    "reference_id": "RHSA-2024:10748",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10748"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10752",
                    "reference_id": "RHSA-2024:10752",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10752"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10844",
                    "reference_id": "RHSA-2024:10844",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10844"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10848",
                    "reference_id": "RHSA-2024:10848",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10848"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10849",
                    "reference_id": "RHSA-2024:10849",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10849"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10880",
                    "reference_id": "RHSA-2024:10880",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10880"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10881",
                    "reference_id": "RHSA-2024:10881",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10881"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7134-1/",
                    "reference_id": "USN-7134-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7134-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940802?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:115.12.0-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940953?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940952?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940954?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:128.5.0esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940800?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.6.0esr-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940804?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.8.0esr-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940803?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.0esr-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5dw5-vpt8-zqbz"
                        },
                        {
                            "vulnerability": "VCID-9ag7-z86d-nba9"
                        },
                        {
                            "vulnerability": "VCID-qbzp-euvv-q7c7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.0esr-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1067638?format=api",
                    "purl": "pkg:deb/debian/thunderbird@1:140.9.1esr-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:140.9.1esr-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-11699"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w7gj-shrq-3fcz"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/thunderbird@1:128.5.0esr-1~deb12u1%3Fdistro=trixie"
}