{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","type":"deb","namespace":"debian","name":"firefox","version":"1.5.dfsg+1.5.0.4-1","qualifiers":{"distro":"sid"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.5.dfsg+1.5.0.5-1","latest_non_vulnerable_version":"150.0.1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32082?format=json","vulnerability_id":"VCID-1azv-247b-xufb","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2784","reference_id":"","reference_type":"","scores":[{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88464","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88348","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88356","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88376","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88395","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88411","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88418","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.8843","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88436","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03983","scoring_system":"epss","scoring_elements":"0.88447","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2784"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618118","reference_id":"1618118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784","reference_id":"CVE-2006-2784","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2784"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-36","reference_id":"mfsa2006-36","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-36"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2784"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1azv-247b-xufb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32075?format=json","vulnerability_id":"VCID-anuu-bk6v-93ec","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2777","reference_id":"","reference_type":"","scores":[{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97058","published_at":"2026-05-07T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.9701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97014","published_at":"2026-04-07T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97024","published_at":"2026-04-09T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97029","published_at":"2026-04-13T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97038","published_at":"2026-04-16T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97042","published_at":"2026-04-18T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97046","published_at":"2026-04-21T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.35105","scoring_system":"epss","scoring_elements":"0.97054","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777","reference_id":"CVE-2006-2777","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-43","reference_id":"mfsa2006-43","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-43"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2777"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-anuu-bk6v-93ec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32080?format=json","vulnerability_id":"VCID-bj2j-3fjg-yyhr","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2782","reference_id":"","reference_type":"","scores":[{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80804","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80629","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80637","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80655","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80682","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80692","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80695","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80721","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80725","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80752","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80765","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01435","scoring_system":"epss","scoring_elements":"0.80783","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2782"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618116","reference_id":"1618116","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618116"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782","reference_id":"CVE-2006-2782","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-41","reference_id":"mfsa2006-41","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-41"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2782"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bj2j-3fjg-yyhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32076?format=json","vulnerability_id":"VCID-cggq-6c2f-1qf4","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2778","reference_id":"","reference_type":"","scores":[{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.9591","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95918","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95926","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.9593","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95939","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95941","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95962","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95964","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.23254","scoring_system":"epss","scoring_elements":"0.95974","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2778"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618113","reference_id":"1618113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618113"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778","reference_id":"CVE-2006-2778","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-38","reference_id":"mfsa2006-38","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-38"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2778"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cggq-6c2f-1qf4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32079?format=json","vulnerability_id":"VCID-fsff-rm4y-wudc","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2780","reference_id":"","reference_type":"","scores":[{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.9636","published_at":"2026-05-07T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96288","published_at":"2026-04-01T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96318","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96321","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96328","published_at":"2026-04-13T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96336","published_at":"2026-04-16T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96341","published_at":"2026-04-18T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96344","published_at":"2026-04-26T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26533","scoring_system":"epss","scoring_elements":"0.96354","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2780"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618115","reference_id":"1618115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618115"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780","reference_id":"CVE-2006-2780","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32","reference_id":"mfsa2006-32","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2780"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fsff-rm4y-wudc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32081?format=json","vulnerability_id":"VCID-gs89-ejt1-q7db","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2783","reference_id":"","reference_type":"","scores":[{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89739","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89647","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89681","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89687","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89693","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89686","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89703","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89697","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89713","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89715","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89714","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04975","scoring_system":"epss","scoring_elements":"0.89725","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2783"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618117","reference_id":"1618117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618117"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783","reference_id":"CVE-2006-2783","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-42","reference_id":"mfsa2006-42","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-42"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2783"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gs89-ejt1-q7db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32085?format=json","vulnerability_id":"VCID-kbyn-rze5-2qeg","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2787","reference_id":"","reference_type":"","scores":[{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92726","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92668","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92678","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92683","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92701","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92705","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92704","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09158","scoring_system":"epss","scoring_elements":"0.92712","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2787"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618121","reference_id":"1618121","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787","reference_id":"CVE-2006-2787","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-31","reference_id":"mfsa2006-31","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2787"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kbyn-rze5-2qeg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32083?format=json","vulnerability_id":"VCID-nnxw-14g9-77da","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2785","reference_id":"","reference_type":"","scores":[{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83838","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83667","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83681","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83684","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83707","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.8373","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83724","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83719","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83754","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83755","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83779","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02013","scoring_system":"epss","scoring_elements":"0.83817","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2785"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618119","reference_id":"1618119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785","reference_id":"CVE-2006-2785","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-34","reference_id":"mfsa2006-34","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-34"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2785"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nnxw-14g9-77da"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32084?format=json","vulnerability_id":"VCID-t5kr-v1tx-5kdy","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2786","reference_id":"","reference_type":"","scores":[{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85264","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85131","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85157","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85194","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85195","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85218","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85227","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02439","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2786"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618120","reference_id":"1618120","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618120"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786","reference_id":"CVE-2006-2786","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-33","reference_id":"mfsa2006-33","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-33"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2786"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t5kr-v1tx-5kdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32073?format=json","vulnerability_id":"VCID-u63v-3cmf-ryh6","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2775","reference_id":"","reference_type":"","scores":[{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92086","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92017","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92023","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92031","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92036","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92048","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92051","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92055","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92067","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92064","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92062","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92065","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07929","scoring_system":"epss","scoring_elements":"0.92073","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2775"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775","reference_id":"CVE-2006-2775","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-35","reference_id":"mfsa2006-35","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-35"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2775"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u63v-3cmf-ryh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32077?format=json","vulnerability_id":"VCID-ucgx-bfkb-4kg5","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2779","reference_id":"","reference_type":"","scores":[{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95982","published_at":"2026-05-07T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95914","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95922","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.9593","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95945","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95949","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95951","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95962","published_at":"2026-04-16T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95966","published_at":"2026-04-18T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95967","published_at":"2026-04-29T12:55:00Z"},{"value":"0.23286","scoring_system":"epss","scoring_elements":"0.95977","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2779"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618114","reference_id":"1618114","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779","reference_id":"CVE-2006-2779","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32","reference_id":"mfsa2006-32","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2779"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ucgx-bfkb-4kg5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/32074?format=json","vulnerability_id":"VCID-xewd-ab7q-5bfs","summary":"Vulnerabilities in Mozilla Firefox allow privilege escalations for\n    JavaScript code, cross site scripting attacks, HTTP response smuggling and\n    possibly the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2776","reference_id":"","reference_type":"","scores":[{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96788","published_at":"2026-05-07T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96739","published_at":"2026-04-02T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96745","published_at":"2026-04-07T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96752","published_at":"2026-04-08T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96753","published_at":"2026-04-09T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96756","published_at":"2026-04-12T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96765","published_at":"2026-04-16T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96769","published_at":"2026-04-18T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96772","published_at":"2026-04-21T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96771","published_at":"2026-04-24T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.31164","scoring_system":"epss","scoring_elements":"0.96785","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-2776"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618112","reference_id":"1618112","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618112"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776","reference_id":"CVE-2006-2776","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776"},{"reference_url":"https://security.gentoo.org/glsa/200606-12","reference_id":"GLSA-200606-12","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-12"},{"reference_url":"https://security.gentoo.org/glsa/200606-21","reference_id":"GLSA-200606-21","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200606-21"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-37","reference_id":"mfsa2006-37","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-37"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0578","reference_id":"RHSA-2006:0578","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0594","reference_id":"RHSA-2006:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0609","reference_id":"RHSA-2006:0609","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0609"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0610","reference_id":"RHSA-2006:0610","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0610"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0611","reference_id":"RHSA-2006:0611","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0611"},{"reference_url":"https://usn.ubuntu.com/296-1/","reference_id":"USN-296-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-1/"},{"reference_url":"https://usn.ubuntu.com/296-2/","reference_id":"USN-296-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/296-2/"},{"reference_url":"https://usn.ubuntu.com/297-1/","reference_id":"USN-297-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-1/"},{"reference_url":"https://usn.ubuntu.com/297-3/","reference_id":"USN-297-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/297-3/"},{"reference_url":"https://usn.ubuntu.com/323-1/","reference_id":"USN-323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/323-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-2776"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xewd-ab7q-5bfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63603?format=json","vulnerability_id":"VCID-z23q-ts2f-17a3","summary":"Normally Mozilla-based clients prevent web content from linking to local files\nbut Eric Foley reports a partial bypass of this restriction by using Windows\nfilename syntax (on a Windows computer) rather than a file:/// URL as the\nSRC= attribute. The image will not be loaded on the web page--it will appear as\na broken image--but if a user can be convinced to right-click and select\n\"View Image\" then the content will be loaded. Since the image will replace\nthe current document attacker script cannot be run on it. Loading a local\nfile at a known location is about the extent of this attack.If the local file is a media file an external helper program may be launched\nto play the media depending on your settings. The action will be the same\nas if you had clicked on a remote link of the same media type and does not\npresent any additional risk. Local files identified as executable will\nnever be opened in this way, with \"executable\" broadly\ndefined on windows to include many scriptable document formats with a history\nof being abused.By referencing a local device rather than a file this could be used\nas a limited denial-of-service attack to hang the browser.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1942","reference_id":"","reference_type":"","scores":[{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86517","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86371","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86398","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.864","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86419","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86442","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86436","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86451","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.8647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.8648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86478","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0294","scoring_system":"epss","scoring_elements":"0.86498","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-1942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1942","reference_id":"CVE-2006-1942","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1942"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-39","reference_id":"mfsa2006-39","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2006-39"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1105248?format=json","purl":"pkg:deb/debian/firefox@150.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582402?format=json","purl":"pkg:deb/debian/firefox@1.5.dfsg%2B1.5.0.4-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/582059?format=json","purl":"pkg:deb/debian/firefox@149.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1059611?format=json","purl":"pkg:deb/debian/firefox@149.0.2-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@149.0.2-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1076056?format=json","purl":"pkg:deb/debian/firefox@150.0-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0-1%3Fdistro=sid"},{"url":"http://public2.vulnerablecode.io/api/packages/1088670?format=json","purl":"pkg:deb/debian/firefox@150.0.1-1?distro=sid","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@150.0.1-1%3Fdistro=sid"}],"aliases":["CVE-2006-1942"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z23q-ts2f-17a3"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/firefox@1.5.dfsg%252B1.5.0.4-1%3Fdistro=sid"}