Lookup for vulnerable packages by Package URL.

GET /api/packages/1056065?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1056065?format=api",
    "purl": "pkg:deb/debian/firefox-esr@140.9.0esr-1",
    "type": "deb",
    "namespace": "debian",
    "name": "firefox-esr",
    "version": "140.9.0esr-1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "140.10.1esr-1~deb12u1",
    "latest_non_vulnerable_version": "140.10.1esr-1~deb12u1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349997?format=api",
            "vulnerability_id": "VCID-5dw5-vpt8-zqbz",
            "summary": "Memory safety bugs present in Firefox ESR 115.34.0, Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5731.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5731.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17244",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17176",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17187",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00055",
                            "scoring_system": "epss",
                            "scoring_elements": "0.17223",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20043",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20167",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20168",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19999",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19922",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20012",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20048",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21545",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21869",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00072",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21867",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5731"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5731"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455901",
                    "reference_id": "2455901",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455901"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-25",
                    "reference_id": "mfsa2026-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-25"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-25/",
                    "reference_id": "mfsa2026-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-25/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-26",
                    "reference_id": "mfsa2026-26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "low",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-26"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-26/",
                    "reference_id": "mfsa2026-26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-26/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-27",
                    "reference_id": "mfsa2026-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-27"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-27/",
                    "reference_id": "mfsa2026-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-27/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-28",
                    "reference_id": "mfsa2026-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-28"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-28/",
                    "reference_id": "mfsa2026-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-28/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-29",
                    "reference_id": "mfsa2026-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-29/",
                    "reference_id": "mfsa2026-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:12:57Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-29/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:11805",
                    "reference_id": "RHSA-2026:11805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:11805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:11813",
                    "reference_id": "RHSA-2026:11813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:11813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:12264",
                    "reference_id": "RHSA-2026:12264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:12264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13342",
                    "reference_id": "RHSA-2026:13342",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13342"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13412",
                    "reference_id": "RHSA-2026:13412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13533",
                    "reference_id": "RHSA-2026:13533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13582",
                    "reference_id": "RHSA-2026:13582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13583",
                    "reference_id": "RHSA-2026:13583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13596",
                    "reference_id": "RHSA-2026:13596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13596"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13600",
                    "reference_id": "RHSA-2026:13600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13600"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13665",
                    "reference_id": "RHSA-2026:13665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13682",
                    "reference_id": "RHSA-2026:13682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13683",
                    "reference_id": "RHSA-2026:13683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13922",
                    "reference_id": "RHSA-2026:13922",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13922"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13977",
                    "reference_id": "RHSA-2026:13977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13977"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:14223",
                    "reference_id": "RHSA-2026:14223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:14223"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:14303",
                    "reference_id": "RHSA-2026:14303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:14303"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7671",
                    "reference_id": "RHSA-2026:7671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7672",
                    "reference_id": "RHSA-2026:7672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7672"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8052",
                    "reference_id": "RHSA-2026:8052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8052"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8459",
                    "reference_id": "RHSA-2026:8459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9345",
                    "reference_id": "RHSA-2026:9345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9345"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9638",
                    "reference_id": "RHSA-2026:9638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9638"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089383?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1y9d-wx59-fyh2"
                        },
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-9uk1-zvat-5qc9"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-ndwm-svz7-5uen"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        },
                        {
                            "vulnerability": "VCID-zkbj-717t-j3hw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072927?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1056066?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089390?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.10.1esr-1~deb12u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.1esr-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2026-5731"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5dw5-vpt8-zqbz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349998?format=api",
            "vulnerability_id": "VCID-9ag7-z86d-nba9",
            "summary": "Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5734.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5734.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13903",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13955",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13912",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13876",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18556",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18365",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1828",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18413",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18471",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18576",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18547",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18602",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00059",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18456",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20018",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5734"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5734"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455897",
                    "reference_id": "2455897",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455897"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505",
                    "reference_id": "buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=2022369%2C2023026%2C2023545%2C2023555%2C2023958%2C2025422%2C2025468%2C2025492%2C2025505"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-25",
                    "reference_id": "mfsa2026-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-25"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-25/",
                    "reference_id": "mfsa2026-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-25/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-27",
                    "reference_id": "mfsa2026-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-27"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-27/",
                    "reference_id": "mfsa2026-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-27/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-28",
                    "reference_id": "mfsa2026-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-28"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-28/",
                    "reference_id": "mfsa2026-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-28/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-29",
                    "reference_id": "mfsa2026-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-29/",
                    "reference_id": "mfsa2026-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-08T03:55:30Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-29/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:11805",
                    "reference_id": "RHSA-2026:11805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:11805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:11813",
                    "reference_id": "RHSA-2026:11813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:11813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:12264",
                    "reference_id": "RHSA-2026:12264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:12264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13342",
                    "reference_id": "RHSA-2026:13342",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13342"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13412",
                    "reference_id": "RHSA-2026:13412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13533",
                    "reference_id": "RHSA-2026:13533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13582",
                    "reference_id": "RHSA-2026:13582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13583",
                    "reference_id": "RHSA-2026:13583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13596",
                    "reference_id": "RHSA-2026:13596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13596"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13600",
                    "reference_id": "RHSA-2026:13600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13600"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13665",
                    "reference_id": "RHSA-2026:13665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13682",
                    "reference_id": "RHSA-2026:13682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13683",
                    "reference_id": "RHSA-2026:13683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13922",
                    "reference_id": "RHSA-2026:13922",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13922"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13977",
                    "reference_id": "RHSA-2026:13977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13977"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:14223",
                    "reference_id": "RHSA-2026:14223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:14223"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:14303",
                    "reference_id": "RHSA-2026:14303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:14303"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7671",
                    "reference_id": "RHSA-2026:7671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7672",
                    "reference_id": "RHSA-2026:7672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7672"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8052",
                    "reference_id": "RHSA-2026:8052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8052"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8459",
                    "reference_id": "RHSA-2026:8459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9345",
                    "reference_id": "RHSA-2026:9345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9345"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9638",
                    "reference_id": "RHSA-2026:9638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9638"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089383?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1y9d-wx59-fyh2"
                        },
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-9uk1-zvat-5qc9"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-ndwm-svz7-5uen"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        },
                        {
                            "vulnerability": "VCID-zkbj-717t-j3hw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072927?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1056066?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089390?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.10.1esr-1~deb12u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.1esr-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2026-5734"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9ag7-z86d-nba9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19209?format=api",
            "vulnerability_id": "VCID-f81v-9fv8-93cd",
            "summary": "Out-of-bounds Write\nHeap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5217.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5217.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87745",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87722",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87728",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8774",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87733",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87731",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03573",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87744",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88738",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.04175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88728",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88729",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88723",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88708",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88766",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.04175",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88754",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89562",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5217"
                },
                {
                    "reference_url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software"
                },
                {
                    "reference_url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241191",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241191"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html"
                },
                {
                    "reference_url": "https://crbug.com/1486441",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://crbug.com/1486441"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Oct/12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Oct/12"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2023/Oct/16",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2023/Oct/16"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/electron/electron",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron"
                },
                {
                    "reference_url": "https://github.com/electron/electron/pull/40022",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/pull/40022"
                },
                {
                    "reference_url": "https://github.com/electron/electron/pull/40023",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/pull/40023"
                },
                {
                    "reference_url": "https://github.com/electron/electron/pull/40024",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/pull/40024"
                },
                {
                    "reference_url": "https://github.com/electron/electron/pull/40025",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/pull/40025"
                },
                {
                    "reference_url": "https://github.com/electron/electron/pull/40026",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/pull/40026"
                },
                {
                    "reference_url": "https://github.com/electron/electron/releases/tag/v22.3.25",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/releases/tag/v22.3.25"
                },
                {
                    "reference_url": "https://github.com/electron/electron/releases/tag/v24.8.5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/releases/tag/v24.8.5"
                },
                {
                    "reference_url": "https://github.com/electron/electron/releases/tag/v25.8.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/releases/tag/v25.8.4"
                },
                {
                    "reference_url": "https://github.com/electron/electron/releases/tag/v26.2.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/releases/tag/v26.2.4"
                },
                {
                    "reference_url": "https://github.com/electron/electron/releases/tag/v27.0.0-beta.8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/electron/electron/releases/tag/v27.0.0-beta.8"
                },
                {
                    "reference_url": "https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590"
                },
                {
                    "reference_url": "https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282"
                },
                {
                    "reference_url": "https://github.com/webmproject/libvpx/releases/tag/v1.13.1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://github.com/webmproject/libvpx/releases/tag/v1.13.1"
                },
                {
                    "reference_url": "https://github.com/webmproject/libvpx/tags",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://github.com/webmproject/libvpx/tags"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/"
                },
                {
                    "reference_url": "https://pastebin.com/TdkC4pDv",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://pastebin.com/TdkC4pDv"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202310-04",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202310-04"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-34",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202401-34"
                },
                {
                    "reference_url": "https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217"
                },
                {
                    "reference_url": "https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213961"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213972",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213972"
                },
                {
                    "reference_url": "https://twitter.com/maddiestone/status/1707163313711497266",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://twitter.com/maddiestone/status/1707163313711497266"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5508",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5508"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5509"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5510",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2023/dsa-5510"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-44",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "critical",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-44"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2023/09/28/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2023/09/28/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/28/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/28/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/28/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/28/6"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/29/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/29/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/29/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/29/11"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/29/12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/29/12"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/29/14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/29/14"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/29/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/29/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/29/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/29/7"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/29/9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/29/9"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/30/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/30/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/30/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/30/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/30/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/30/3"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/30/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/30/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/09/30/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/09/30/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/01/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/10/01/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/01/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/10/01/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/01/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/10/01/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/02/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/10/02/6"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/03/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2023/10/03/11"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053182",
                    "reference_id": "1053182",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053182"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/",
                    "reference_id": "AY642Z6JZODQJE7Z62CFREVUHEGCXGPD",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5217",
                    "reference_id": "CVE-2023-5217",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5217"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2023-5217",
                    "reference_id": "CVE-2023-5217",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2023-5217"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-qqvq-6xgj-jw8g",
                    "reference_id": "GHSA-qqvq-6xgj-jw8g",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-qqvq-6xgj-jw8g"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5426",
                    "reference_id": "RHSA-2023:5426",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5426"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5427",
                    "reference_id": "RHSA-2023:5427",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5427"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5428",
                    "reference_id": "RHSA-2023:5428",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5428"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5429",
                    "reference_id": "RHSA-2023:5429",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5429"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5430",
                    "reference_id": "RHSA-2023:5430",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5430"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5432",
                    "reference_id": "RHSA-2023:5432",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5432"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5433",
                    "reference_id": "RHSA-2023:5433",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5433"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5434",
                    "reference_id": "RHSA-2023:5434",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5434"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5435",
                    "reference_id": "RHSA-2023:5435",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5435"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5436",
                    "reference_id": "RHSA-2023:5436",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5436"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5437",
                    "reference_id": "RHSA-2023:5437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5438",
                    "reference_id": "RHSA-2023:5438",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5438"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5439",
                    "reference_id": "RHSA-2023:5439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5440",
                    "reference_id": "RHSA-2023:5440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5475",
                    "reference_id": "RHSA-2023:5475",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5475"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5477",
                    "reference_id": "RHSA-2023:5477",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5477"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5534",
                    "reference_id": "RHSA-2023:5534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5534"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5535",
                    "reference_id": "RHSA-2023:5535",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5535"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5536",
                    "reference_id": "RHSA-2023:5536",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5536"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5537",
                    "reference_id": "RHSA-2023:5537",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5537"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5538",
                    "reference_id": "RHSA-2023:5538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5538"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5539",
                    "reference_id": "RHSA-2023:5539",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5539"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:5540",
                    "reference_id": "RHSA-2023:5540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:5540"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/",
                    "reference_id": "TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Attend",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6403-1/",
                    "reference_id": "USN-6403-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6403-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6403-2/",
                    "reference_id": "USN-6403-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6403-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6403-3/",
                    "reference_id": "USN-6403-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6403-3/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6404-1/",
                    "reference_id": "USN-6404-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6404-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6405-1/",
                    "reference_id": "USN-6405-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6405-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7172-1/",
                    "reference_id": "USN-7172-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7172-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089383?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1y9d-wx59-fyh2"
                        },
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-9uk1-zvat-5qc9"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-ndwm-svz7-5uen"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        },
                        {
                            "vulnerability": "VCID-zkbj-717t-j3hw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1056066?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1076491?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.10.0esr-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1y9d-wx59-fyh2"
                        },
                        {
                            "vulnerability": "VCID-9uk1-zvat-5qc9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-ndwm-svz7-5uen"
                        },
                        {
                            "vulnerability": "VCID-zkbj-717t-j3hw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.0esr-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1088977?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.10.1esr-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-3a6f-173h-fqbz"
                        },
                        {
                            "vulnerability": "VCID-4e49-6tg2-e7d9"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-pszh-x9gd-xyg4"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.1esr-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1105447?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.10.2esr-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.2esr-1"
                }
            ],
            "aliases": [
                "CVE-2023-5217",
                "GHSA-qqvq-6xgj-jw8g"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f81v-9fv8-93cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349995?format=api",
            "vulnerability_id": "VCID-qbzp-euvv-q7c7",
            "summary": "",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5732.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5732.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11778",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1175",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11723",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00039",
                            "scoring_system": "epss",
                            "scoring_elements": "0.11789",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12862",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12843",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12742",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12738",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12835",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12758",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12621",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12717",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00042",
                            "scoring_system": "epss",
                            "scoring_elements": "0.12824",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14121",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5732"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5732"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455908",
                    "reference_id": "2455908",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2455908"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-25",
                    "reference_id": "mfsa2026-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-25"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-25/",
                    "reference_id": "mfsa2026-25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-25/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-27",
                    "reference_id": "mfsa2026-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-27"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-27/",
                    "reference_id": "mfsa2026-27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-27/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-28",
                    "reference_id": "mfsa2026-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-28"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-28/",
                    "reference_id": "mfsa2026-28",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-28/"
                },
                {
                    "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-29",
                    "reference_id": "mfsa2026-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "high",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2026-29"
                },
                {
                    "reference_url": "https://www.mozilla.org/security/advisories/mfsa2026-29/",
                    "reference_id": "mfsa2026-29",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/"
                        }
                    ],
                    "url": "https://www.mozilla.org/security/advisories/mfsa2026-29/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:11805",
                    "reference_id": "RHSA-2026:11805",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:11805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:11813",
                    "reference_id": "RHSA-2026:11813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:11813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:12264",
                    "reference_id": "RHSA-2026:12264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:12264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13342",
                    "reference_id": "RHSA-2026:13342",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13342"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13412",
                    "reference_id": "RHSA-2026:13412",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13412"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13533",
                    "reference_id": "RHSA-2026:13533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13533"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13582",
                    "reference_id": "RHSA-2026:13582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13583",
                    "reference_id": "RHSA-2026:13583",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13583"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13596",
                    "reference_id": "RHSA-2026:13596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13596"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13600",
                    "reference_id": "RHSA-2026:13600",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13600"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13665",
                    "reference_id": "RHSA-2026:13665",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13665"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13682",
                    "reference_id": "RHSA-2026:13682",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13682"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13683",
                    "reference_id": "RHSA-2026:13683",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13683"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13922",
                    "reference_id": "RHSA-2026:13922",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13922"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:13977",
                    "reference_id": "RHSA-2026:13977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:13977"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:14223",
                    "reference_id": "RHSA-2026:14223",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:14223"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:14303",
                    "reference_id": "RHSA-2026:14303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:14303"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7671",
                    "reference_id": "RHSA-2026:7671",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7671"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:7672",
                    "reference_id": "RHSA-2026:7672",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:7672"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8052",
                    "reference_id": "RHSA-2026:8052",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8052"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:8459",
                    "reference_id": "RHSA-2026:8459",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:8459"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9345",
                    "reference_id": "RHSA-2026:9345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9345"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2026:9638",
                    "reference_id": "RHSA-2026:9638",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2026:9638"
                },
                {
                    "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2017867",
                    "reference_id": "show_bug.cgi?id=2017867",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-07T14:28:39Z/"
                        }
                    ],
                    "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=2017867"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089383?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1y9d-wx59-fyh2"
                        },
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-9uk1-zvat-5qc9"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-ndwm-svz7-5uen"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        },
                        {
                            "vulnerability": "VCID-zkbj-717t-j3hw"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb12u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1072927?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1~deb13u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1056066?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.9.1esr-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2fqb-r5zb-a7dp"
                        },
                        {
                            "vulnerability": "VCID-3kv6-c148-nkhq"
                        },
                        {
                            "vulnerability": "VCID-59d3-343b-e3aw"
                        },
                        {
                            "vulnerability": "VCID-61r1-arbe-dke4"
                        },
                        {
                            "vulnerability": "VCID-7jt2-zr49-7ye5"
                        },
                        {
                            "vulnerability": "VCID-95et-ezmb-buau"
                        },
                        {
                            "vulnerability": "VCID-9nbw-7c9e-13af"
                        },
                        {
                            "vulnerability": "VCID-av7u-3g4m-mugm"
                        },
                        {
                            "vulnerability": "VCID-bwth-uepr-z7a3"
                        },
                        {
                            "vulnerability": "VCID-cjsm-7gxr-8ygw"
                        },
                        {
                            "vulnerability": "VCID-d16s-p141-qbft"
                        },
                        {
                            "vulnerability": "VCID-f81v-9fv8-93cd"
                        },
                        {
                            "vulnerability": "VCID-fxjm-ywug-f3d5"
                        },
                        {
                            "vulnerability": "VCID-hk2m-rbdy-nqhc"
                        },
                        {
                            "vulnerability": "VCID-ma29-qa7e-9qb4"
                        },
                        {
                            "vulnerability": "VCID-nge1-4cvg-zqb2"
                        },
                        {
                            "vulnerability": "VCID-nyum-jpbc-abew"
                        },
                        {
                            "vulnerability": "VCID-p6yz-xs58-u3gm"
                        },
                        {
                            "vulnerability": "VCID-pfmd-zv8f-8bfc"
                        },
                        {
                            "vulnerability": "VCID-q689-wneh-hbdq"
                        },
                        {
                            "vulnerability": "VCID-q8qp-5szp-mfe8"
                        },
                        {
                            "vulnerability": "VCID-ruqn-mk9t-57hb"
                        },
                        {
                            "vulnerability": "VCID-tv7r-qf2c-dqbm"
                        },
                        {
                            "vulnerability": "VCID-w98r-yagc-kkec"
                        },
                        {
                            "vulnerability": "VCID-z6tm-b352-5uhk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.1esr-1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1089390?format=api",
                    "purl": "pkg:deb/debian/firefox-esr@140.10.1esr-1~deb12u1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.10.1esr-1~deb12u1"
                }
            ],
            "aliases": [
                "CVE-2026-5732"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qbzp-euvv-q7c7"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox-esr@140.9.0esr-1"
}