{"url":"http://public2.vulnerablecode.io/api/packages/130067?format=json","purl":"pkg:rpm/redhat/seamonkey@1.0.3-0.el4?arch=1","type":"rpm","namespace":"redhat","name":"seamonkey","version":"1.0.3-0.el4","qualifiers":{"arch":"1"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32082?format=json","vulnerability_id":"VCID-1azv-247b-xufb","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2784","reference_id":"","reference_type":"","scores":[{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88348","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88376","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88395","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88418","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.8843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2784"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618118","reference_id":"1618118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784","reference_id":"CVE-2006-2784","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-36","reference_id":"mfsa2006-36","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-36"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2784"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1azv-247b-xufb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36773?format=json","vulnerability_id":"VCID-1bwt-pf55-7ubd","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3808.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3808","reference_id":"","reference_type":"","scores":[{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84922","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84791","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84826","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84827","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.8485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84873","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02341","scoring_system":"epss","scoring_elements":"0.84912","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3808"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618168","reference_id":"1618168","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808","reference_id":"CVE-2006-3808","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3808"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-52","reference_id":"mfsa2006-52","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-52"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/361-1/","reference_id":"USN-361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/361-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3808"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1bwt-pf55-7ubd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88860?format=json","vulnerability_id":"VCID-2bqp-adeh-7kck","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2788.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2788","reference_id":"","reference_type":"","scores":[{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92216","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92232","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92243","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92246","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92252","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92261","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.9226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92262","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92267","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08288","scoring_system":"epss","scoring_elements":"0.92263","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2788"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618122","reference_id":"1618122","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/361-1/","reference_id":"USN-361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/361-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2788"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2bqp-adeh-7kck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36568?format=json","vulnerability_id":"VCID-2khw-6pqe-n3f2","summary":"Several vulnerabilities in Mozilla Thunderbird allow cross site scripting,\n    JavaScript privilege escalation and possibly execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2781","reference_id":"","reference_type":"","scores":[{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.9158","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91588","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91594","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91629","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91646","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91639","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07236","scoring_system":"epss","scoring_elements":"0.91644","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2781"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=193963","reference_id":"193963","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=193963"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781","reference_id":"CVE-2006-2781","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-40","reference_id":"mfsa2006-40","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-40"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2781"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2khw-6pqe-n3f2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36766?format=json","vulnerability_id":"VCID-358q-cakg-h7h4","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3803.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3803","reference_id":"","reference_type":"","scores":[{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96104","published_at":"2026-04-01T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96118","published_at":"2026-04-04T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96123","published_at":"2026-04-07T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96134","published_at":"2026-04-08T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96137","published_at":"2026-04-09T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.9614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96141","published_at":"2026-04-13T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.9615","published_at":"2026-04-16T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96154","published_at":"2026-04-18T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.24704","scoring_system":"epss","scoring_elements":"0.96158","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3803"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618163","reference_id":"1618163","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618163"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803","reference_id":"CVE-2006-3803","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3803"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48","reference_id":"mfsa2006-48","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3803"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-358q-cakg-h7h4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36777?format=json","vulnerability_id":"VCID-72wd-b7rj-3fda","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3810.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3810.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3810","reference_id":"","reference_type":"","scores":[{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94272","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94217","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94229","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94231","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.9424","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94244","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94263","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94269","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1364","scoring_system":"epss","scoring_elements":"0.94273","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3810"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618170","reference_id":"1618170","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810","reference_id":"CVE-2006-3810","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3810"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54","reference_id":"mfsa2006-54","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-54"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3810"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-72wd-b7rj-3fda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36764?format=json","vulnerability_id":"VCID-8ffc-g2p2-xfax","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3801.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3801.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3801","reference_id":"","reference_type":"","scores":[{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.9647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96418","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96429","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96441","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96444","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96449","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96452","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96458","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96463","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96465","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27761","scoring_system":"epss","scoring_elements":"0.96468","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3801"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618161","reference_id":"1618161","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618161"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801","reference_id":"CVE-2006-3801","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3801"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44","reference_id":"mfsa2006-44","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3801"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8ffc-g2p2-xfax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36761?format=json","vulnerability_id":"VCID-9u64-4cr7-w3e1","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3677.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3677","reference_id":"","reference_type":"","scores":[{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98574","published_at":"2026-04-29T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98569","published_at":"2026-04-21T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.9857","published_at":"2026-04-18T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98572","published_at":"2026-04-24T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98573","published_at":"2026-04-26T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98557","published_at":"2026-04-07T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98559","published_at":"2026-04-08T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98561","published_at":"2026-04-09T12:55:00Z"},{"value":"0.67298","scoring_system":"epss","scoring_elements":"0.98563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.76758","scoring_system":"epss","scoring_elements":"0.98939","published_at":"2026-04-01T12:55:00Z"},{"value":"0.76758","scoring_system":"epss","scoring_elements":"0.98941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.76758","scoring_system":"epss","scoring_elements":"0.98943","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3677"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618153","reference_id":"1618153","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618153"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677","reference_id":"CVE-2006-3677","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3677"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2082.html","reference_id":"CVE-2006-3677","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2082.html"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16300.rb","reference_id":"CVE-2006-3677;OSVDB-27559","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/16300.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9946.rb","reference_id":"CVE-2006-3677;OSVDB-27559","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9946.rb"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-45","reference_id":"mfsa2006-45","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-45"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3677"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9u64-4cr7-w3e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32080?format=json","vulnerability_id":"VCID-bj2j-3fjg-yyhr","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2782","reference_id":"","reference_type":"","scores":[{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80692","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80721","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2782"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618116","reference_id":"1618116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782","reference_id":"CVE-2006-2782","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-41","reference_id":"mfsa2006-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-41"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2782"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bj2j-3fjg-yyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32076?format=json","vulnerability_id":"VCID-cggq-6c2f-1qf4","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2778","reference_id":"","reference_type":"","scores":[{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.9593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95939","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95964","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2778"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618113","reference_id":"1618113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618113"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778","reference_id":"CVE-2006-2778","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-38","reference_id":"mfsa2006-38","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2778"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cggq-6c2f-1qf4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36770?format=json","vulnerability_id":"VCID-dvd1-3gbf-d3gw","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3806.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3806","reference_id":"","reference_type":"","scores":[{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96335","published_at":"2026-04-01T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96343","published_at":"2026-04-02T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96352","published_at":"2026-04-07T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.9636","published_at":"2026-04-08T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96363","published_at":"2026-04-09T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96368","published_at":"2026-04-11T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96367","published_at":"2026-04-12T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.9637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96378","published_at":"2026-04-16T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96384","published_at":"2026-04-21T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96385","published_at":"2026-04-24T12:55:00Z"},{"value":"0.27008","scoring_system":"epss","scoring_elements":"0.96386","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3806"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618166","reference_id":"1618166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618166"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806","reference_id":"CVE-2006-3806","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3806"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50","reference_id":"mfsa2006-50","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"},{"reference_url":"https://usn.ubuntu.com/361-1/","reference_id":"USN-361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/361-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3806"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvd1-3gbf-d3gw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32079?format=json","vulnerability_id":"VCID-fsff-rm4y-wudc","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2780","reference_id":"","reference_type":"","scores":[{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96288","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96341","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96344","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2780"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618115","reference_id":"1618115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780","reference_id":"CVE-2006-2780","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32","reference_id":"mfsa2006-32","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2780"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fsff-rm4y-wudc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36776?format=json","vulnerability_id":"VCID-fxyr-h69x-fybu","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3809.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3809","reference_id":"","reference_type":"","scores":[{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86532","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86425","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86436","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86455","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86484","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86499","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86496","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86491","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86506","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86504","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86523","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02964","scoring_system":"epss","scoring_elements":"0.86533","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3809"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618169","reference_id":"1618169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809","reference_id":"CVE-2006-3809","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3809"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53","reference_id":"mfsa2006-53","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-53"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"},{"reference_url":"https://usn.ubuntu.com/361-1/","reference_id":"USN-361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/361-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3809"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fxyr-h69x-fybu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36767?format=json","vulnerability_id":"VCID-fz39-2htc-4qb3","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3804.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3804.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3804","reference_id":"","reference_type":"","scores":[{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95124","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95085","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95086","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95087","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95095","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95098","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95104","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95119","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95122","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17681","scoring_system":"epss","scoring_elements":"0.95123","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3804"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618164","reference_id":"1618164","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804","reference_id":"CVE-2006-3804","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3804"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-49","reference_id":"mfsa2006-49","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3804"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fz39-2htc-4qb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32081?format=json","vulnerability_id":"VCID-gs89-ejt1-q7db","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2783","reference_id":"","reference_type":"","scores":[{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89714","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89703","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89697","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89713","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89715","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2783"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618117","reference_id":"1618117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783","reference_id":"CVE-2006-2783","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-42","reference_id":"mfsa2006-42","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-42"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2783"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs89-ejt1-q7db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32085?format=json","vulnerability_id":"VCID-kbyn-rze5-2qeg","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2787","reference_id":"","reference_type":"","scores":[{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92704","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92701","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92708","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2787"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618121","reference_id":"1618121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787","reference_id":"CVE-2006-2787","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-31","reference_id":"mfsa2006-31","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2787"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbyn-rze5-2qeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36758?format=json","vulnerability_id":"VCID-nkzt-x77d-8qb3","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3113.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3113.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3113","reference_id":"","reference_type":"","scores":[{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96388","published_at":"2026-04-01T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96395","published_at":"2026-04-02T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96403","published_at":"2026-04-07T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96412","published_at":"2026-04-08T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96415","published_at":"2026-04-09T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.9642","published_at":"2026-04-12T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96431","published_at":"2026-04-16T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96435","published_at":"2026-04-18T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96436","published_at":"2026-04-24T12:55:00Z"},{"value":"0.2749","scoring_system":"epss","scoring_elements":"0.96438","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3113"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618135","reference_id":"1618135","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113","reference_id":"CVE-2006-3113","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3113"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46","reference_id":"mfsa2006-46","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3113"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nkzt-x77d-8qb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32083?format=json","vulnerability_id":"VCID-nnxw-14g9-77da","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2785","reference_id":"","reference_type":"","scores":[{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83681","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83684","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.8373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83724","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83755","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83779","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618119","reference_id":"1618119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785","reference_id":"CVE-2006-2785","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-34","reference_id":"mfsa2006-34","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-34"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2785"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nnxw-14g9-77da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36779?format=json","vulnerability_id":"VCID-pyqg-v477-auex","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3811.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3811.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3811","reference_id":"","reference_type":"","scores":[{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95276","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95288","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95293","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95306","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95309","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95314","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95323","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95327","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.9533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95331","published_at":"2026-04-24T12:55:00Z"},{"value":"0.18952","scoring_system":"epss","scoring_elements":"0.95333","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3811"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618171","reference_id":"1618171","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618171"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811","reference_id":"CVE-2006-3811","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3811"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55","reference_id":"mfsa2006-55","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-55"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"},{"reference_url":"https://usn.ubuntu.com/361-1/","reference_id":"USN-361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/361-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3811"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyqg-v477-auex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36768?format=json","vulnerability_id":"VCID-scb8-77mr-zkap","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3805.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3805.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3805","reference_id":"","reference_type":"","scores":[{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.9587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95878","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95886","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.9589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95905","published_at":"2026-04-11T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95904","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95906","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95923","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23003","scoring_system":"epss","scoring_elements":"0.95925","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3805"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618165","reference_id":"1618165","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805","reference_id":"CVE-2006-3805","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3805"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50","reference_id":"mfsa2006-50","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-50"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"},{"reference_url":"https://usn.ubuntu.com/361-1/","reference_id":"USN-361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/361-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3805"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-scb8-77mr-zkap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32084?format=json","vulnerability_id":"VCID-t5kr-v1tx-5kdy","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2786","reference_id":"","reference_type":"","scores":[{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85195","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85218","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85227","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2786"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618120","reference_id":"1618120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786","reference_id":"CVE-2006-2786","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-33","reference_id":"mfsa2006-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2786"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t5kr-v1tx-5kdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32077?format=json","vulnerability_id":"VCID-ucgx-bfkb-4kg5","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2779","reference_id":"","reference_type":"","scores":[{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95922","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.9593","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95962","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95968","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2779"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618114","reference_id":"1618114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779","reference_id":"CVE-2006-2779","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32","reference_id":"mfsa2006-32","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2779"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucgx-bfkb-4kg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36765?format=json","vulnerability_id":"VCID-vb9f-xdth-j7h3","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3802.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3802","reference_id":"","reference_type":"","scores":[{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88076","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.87984","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.87994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88008","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88039","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88042","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88055","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88054","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88072","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03764","scoring_system":"epss","scoring_elements":"0.88077","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3802"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618162","reference_id":"1618162","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618162"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802","reference_id":"CVE-2006-3802","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3802"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47","reference_id":"mfsa2006-47","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3802"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vb9f-xdth-j7h3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36780?format=json","vulnerability_id":"VCID-vqeh-hhax-fqba","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3812.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3812.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3812","reference_id":"","reference_type":"","scores":[{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94209","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94143","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94153","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.9418","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.942","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94205","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13369","scoring_system":"epss","scoring_elements":"0.94208","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3812"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=200455","reference_id":"200455","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=200455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812","reference_id":"CVE-2006-3812","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3812"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-56","reference_id":"mfsa2006-56","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-56"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3812"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqeh-hhax-fqba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32074?format=json","vulnerability_id":"VCID-xewd-ab7q-5bfs","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2776","reference_id":"","reference_type":"","scores":[{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96753","published_at":"2026-04-09T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96756","published_at":"2026-04-12T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96769","published_at":"2026-04-18T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96772","published_at":"2026-04-21T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96771","published_at":"2026-04-24T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96773","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2776"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618112","reference_id":"1618112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776","reference_id":"CVE-2006-2776","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-37","reference_id":"mfsa2006-37","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[],"aliases":["CVE-2006-2776"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xewd-ab7q-5bfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36771?format=json","vulnerability_id":"VCID-xn67-qscw-nuet","summary":"The Mozilla Foundation has reported numerous security vulnerabilities\n    related to Mozilla SeaMonkey.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3807.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3807.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3807","reference_id":"","reference_type":"","scores":[{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-29T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96525","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96539","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.9655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96555","published_at":"2026-04-12T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96558","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.9657","published_at":"2026-04-18T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96572","published_at":"2026-04-21T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.28858","scoring_system":"epss","scoring_elements":"0.96575","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-3807"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618167","reference_id":"1618167","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618167"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807","reference_id":"CVE-2006-3807","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3807"},{"reference_url":"https://security.gentoo.org/glsa/200608-02","reference_id":"GLSA-200608-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-02"},{"reference_url":"https://security.gentoo.org/glsa/200608-03","reference_id":"GLSA-200608-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-03"},{"reference_url":"https://security.gentoo.org/glsa/200608-04","reference_id":"GLSA-200608-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200608-04"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51","reference_id":"mfsa2006-51","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-51"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0608","reference_id":"RHSA-2006:0608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/327-1/","reference_id":"USN-327-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/327-1/"},{"reference_url":"https://usn.ubuntu.com/329-1/","reference_id":"USN-329-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/329-1/"},{"reference_url":"https://usn.ubuntu.com/350-1/","reference_id":"USN-350-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/350-1/"},{"reference_url":"https://usn.ubuntu.com/361-1/","reference_id":"USN-361-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/361-1/"}],"fixed_packages":[],"aliases":["CVE-2006-3807"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xn67-qscw-nuet"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.3-0.el4%3Farch=1"}