Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
Typeebuild
Namespacemail-client
Namemozilla-thunderbird
Version1.5.0.4
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.5.0.5
Latest_non_vulnerable_version10.0.11
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2khw-6pqe-n3f2
vulnerability_id VCID-2khw-6pqe-n3f2
summary
Several vulnerabilities in Mozilla Thunderbird allow cross site scripting,
    JavaScript privilege escalation and possibly execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2781
reference_id
reference_type
scores
0
value 0.07236
scoring_system epss
scoring_elements 0.91667
published_at 2026-05-07T12:55:00Z
1
value 0.07236
scoring_system epss
scoring_elements 0.9158
published_at 2026-04-01T12:55:00Z
2
value 0.07236
scoring_system epss
scoring_elements 0.91588
published_at 2026-04-02T12:55:00Z
3
value 0.07236
scoring_system epss
scoring_elements 0.91594
published_at 2026-04-04T12:55:00Z
4
value 0.07236
scoring_system epss
scoring_elements 0.91603
published_at 2026-04-07T12:55:00Z
5
value 0.07236
scoring_system epss
scoring_elements 0.91616
published_at 2026-04-08T12:55:00Z
6
value 0.07236
scoring_system epss
scoring_elements 0.91622
published_at 2026-04-09T12:55:00Z
7
value 0.07236
scoring_system epss
scoring_elements 0.91626
published_at 2026-04-13T12:55:00Z
8
value 0.07236
scoring_system epss
scoring_elements 0.91629
published_at 2026-04-12T12:55:00Z
9
value 0.07236
scoring_system epss
scoring_elements 0.91646
published_at 2026-04-24T12:55:00Z
10
value 0.07236
scoring_system epss
scoring_elements 0.91639
published_at 2026-04-21T12:55:00Z
11
value 0.07236
scoring_system epss
scoring_elements 0.91644
published_at 2026-04-26T12:55:00Z
12
value 0.07236
scoring_system epss
scoring_elements 0.91642
published_at 2026-04-29T12:55:00Z
13
value 0.07236
scoring_system epss
scoring_elements 0.91655
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2781
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=193963
reference_id 193963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=193963
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781
reference_id CVE-2006-2781
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781
4
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-40
reference_id mfsa2006-40
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-40
6
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
7
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
8
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
9
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
10
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
11
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
12
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2781
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2khw-6pqe-n3f2
1
url VCID-cggq-6c2f-1qf4
vulnerability_id VCID-cggq-6c2f-1qf4
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2778
reference_id
reference_type
scores
0
value 0.23254
scoring_system epss
scoring_elements 0.95979
published_at 2026-05-07T12:55:00Z
1
value 0.23254
scoring_system epss
scoring_elements 0.9591
published_at 2026-04-01T12:55:00Z
2
value 0.23254
scoring_system epss
scoring_elements 0.95918
published_at 2026-04-02T12:55:00Z
3
value 0.23254
scoring_system epss
scoring_elements 0.95926
published_at 2026-04-04T12:55:00Z
4
value 0.23254
scoring_system epss
scoring_elements 0.9593
published_at 2026-04-07T12:55:00Z
5
value 0.23254
scoring_system epss
scoring_elements 0.95939
published_at 2026-04-08T12:55:00Z
6
value 0.23254
scoring_system epss
scoring_elements 0.95941
published_at 2026-04-09T12:55:00Z
7
value 0.23254
scoring_system epss
scoring_elements 0.95945
published_at 2026-04-12T12:55:00Z
8
value 0.23254
scoring_system epss
scoring_elements 0.95947
published_at 2026-04-13T12:55:00Z
9
value 0.23254
scoring_system epss
scoring_elements 0.95958
published_at 2026-04-16T12:55:00Z
10
value 0.23254
scoring_system epss
scoring_elements 0.95962
published_at 2026-04-18T12:55:00Z
11
value 0.23254
scoring_system epss
scoring_elements 0.95964
published_at 2026-04-29T12:55:00Z
12
value 0.23254
scoring_system epss
scoring_elements 0.95965
published_at 2026-04-24T12:55:00Z
13
value 0.23254
scoring_system epss
scoring_elements 0.95974
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2778
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618113
reference_id 1618113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618113
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
reference_id CVE-2006-2778
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-38
reference_id mfsa2006-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-38
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2778
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cggq-6c2f-1qf4
2
url VCID-fsff-rm4y-wudc
vulnerability_id VCID-fsff-rm4y-wudc
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2780
reference_id
reference_type
scores
0
value 0.26533
scoring_system epss
scoring_elements 0.9636
published_at 2026-05-07T12:55:00Z
1
value 0.26533
scoring_system epss
scoring_elements 0.96288
published_at 2026-04-01T12:55:00Z
2
value 0.26533
scoring_system epss
scoring_elements 0.96296
published_at 2026-04-02T12:55:00Z
3
value 0.26533
scoring_system epss
scoring_elements 0.96304
published_at 2026-04-04T12:55:00Z
4
value 0.26533
scoring_system epss
scoring_elements 0.96309
published_at 2026-04-07T12:55:00Z
5
value 0.26533
scoring_system epss
scoring_elements 0.96318
published_at 2026-04-08T12:55:00Z
6
value 0.26533
scoring_system epss
scoring_elements 0.96321
published_at 2026-04-09T12:55:00Z
7
value 0.26533
scoring_system epss
scoring_elements 0.96325
published_at 2026-04-12T12:55:00Z
8
value 0.26533
scoring_system epss
scoring_elements 0.96328
published_at 2026-04-13T12:55:00Z
9
value 0.26533
scoring_system epss
scoring_elements 0.96336
published_at 2026-04-16T12:55:00Z
10
value 0.26533
scoring_system epss
scoring_elements 0.96341
published_at 2026-04-18T12:55:00Z
11
value 0.26533
scoring_system epss
scoring_elements 0.96342
published_at 2026-04-21T12:55:00Z
12
value 0.26533
scoring_system epss
scoring_elements 0.96343
published_at 2026-04-24T12:55:00Z
13
value 0.26533
scoring_system epss
scoring_elements 0.96344
published_at 2026-04-26T12:55:00Z
14
value 0.26533
scoring_system epss
scoring_elements 0.96345
published_at 2026-04-29T12:55:00Z
15
value 0.26533
scoring_system epss
scoring_elements 0.96354
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2780
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618115
reference_id 1618115
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618115
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780
reference_id CVE-2006-2780
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2780
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-32
reference_id mfsa2006-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-32
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2780
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fsff-rm4y-wudc
3
url VCID-gs89-ejt1-q7db
vulnerability_id VCID-gs89-ejt1-q7db
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2783
reference_id
reference_type
scores
0
value 0.04975
scoring_system epss
scoring_elements 0.89739
published_at 2026-05-07T12:55:00Z
1
value 0.04975
scoring_system epss
scoring_elements 0.89645
published_at 2026-04-01T12:55:00Z
2
value 0.04975
scoring_system epss
scoring_elements 0.89647
published_at 2026-04-02T12:55:00Z
3
value 0.04975
scoring_system epss
scoring_elements 0.89662
published_at 2026-04-04T12:55:00Z
4
value 0.04975
scoring_system epss
scoring_elements 0.89664
published_at 2026-04-07T12:55:00Z
5
value 0.04975
scoring_system epss
scoring_elements 0.89681
published_at 2026-04-08T12:55:00Z
6
value 0.04975
scoring_system epss
scoring_elements 0.89687
published_at 2026-04-09T12:55:00Z
7
value 0.04975
scoring_system epss
scoring_elements 0.89694
published_at 2026-04-11T12:55:00Z
8
value 0.04975
scoring_system epss
scoring_elements 0.89693
published_at 2026-04-12T12:55:00Z
9
value 0.04975
scoring_system epss
scoring_elements 0.89686
published_at 2026-04-13T12:55:00Z
10
value 0.04975
scoring_system epss
scoring_elements 0.89702
published_at 2026-04-16T12:55:00Z
11
value 0.04975
scoring_system epss
scoring_elements 0.89703
published_at 2026-04-18T12:55:00Z
12
value 0.04975
scoring_system epss
scoring_elements 0.89697
published_at 2026-04-21T12:55:00Z
13
value 0.04975
scoring_system epss
scoring_elements 0.89713
published_at 2026-04-24T12:55:00Z
14
value 0.04975
scoring_system epss
scoring_elements 0.89715
published_at 2026-04-26T12:55:00Z
15
value 0.04975
scoring_system epss
scoring_elements 0.89714
published_at 2026-04-29T12:55:00Z
16
value 0.04975
scoring_system epss
scoring_elements 0.89725
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2783
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618117
reference_id 1618117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618117
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
reference_id CVE-2006-2783
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-42
reference_id mfsa2006-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-42
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2783
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gs89-ejt1-q7db
4
url VCID-kbyn-rze5-2qeg
vulnerability_id VCID-kbyn-rze5-2qeg
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2787
reference_id
reference_type
scores
0
value 0.09158
scoring_system epss
scoring_elements 0.92726
published_at 2026-05-07T12:55:00Z
1
value 0.09158
scoring_system epss
scoring_elements 0.92655
published_at 2026-04-01T12:55:00Z
2
value 0.09158
scoring_system epss
scoring_elements 0.92662
published_at 2026-04-02T12:55:00Z
3
value 0.09158
scoring_system epss
scoring_elements 0.92668
published_at 2026-04-07T12:55:00Z
4
value 0.09158
scoring_system epss
scoring_elements 0.92678
published_at 2026-04-08T12:55:00Z
5
value 0.09158
scoring_system epss
scoring_elements 0.92683
published_at 2026-04-09T12:55:00Z
6
value 0.09158
scoring_system epss
scoring_elements 0.92689
published_at 2026-04-11T12:55:00Z
7
value 0.09158
scoring_system epss
scoring_elements 0.92688
published_at 2026-04-12T12:55:00Z
8
value 0.09158
scoring_system epss
scoring_elements 0.92687
published_at 2026-04-13T12:55:00Z
9
value 0.09158
scoring_system epss
scoring_elements 0.92701
published_at 2026-04-18T12:55:00Z
10
value 0.09158
scoring_system epss
scoring_elements 0.92705
published_at 2026-04-21T12:55:00Z
11
value 0.09158
scoring_system epss
scoring_elements 0.92708
published_at 2026-04-26T12:55:00Z
12
value 0.09158
scoring_system epss
scoring_elements 0.92704
published_at 2026-04-29T12:55:00Z
13
value 0.09158
scoring_system epss
scoring_elements 0.92712
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2787
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618121
reference_id 1618121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618121
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
reference_id CVE-2006-2787
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-31
reference_id mfsa2006-31
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-31
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2787
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbyn-rze5-2qeg
5
url VCID-t5kr-v1tx-5kdy
vulnerability_id VCID-t5kr-v1tx-5kdy
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2786
reference_id
reference_type
scores
0
value 0.02439
scoring_system epss
scoring_elements 0.85264
published_at 2026-05-07T12:55:00Z
1
value 0.02439
scoring_system epss
scoring_elements 0.85101
published_at 2026-04-01T12:55:00Z
2
value 0.02439
scoring_system epss
scoring_elements 0.85113
published_at 2026-04-02T12:55:00Z
3
value 0.02439
scoring_system epss
scoring_elements 0.85131
published_at 2026-04-04T12:55:00Z
4
value 0.02439
scoring_system epss
scoring_elements 0.85135
published_at 2026-04-07T12:55:00Z
5
value 0.02439
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-08T12:55:00Z
6
value 0.02439
scoring_system epss
scoring_elements 0.85164
published_at 2026-04-09T12:55:00Z
7
value 0.02439
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-11T12:55:00Z
8
value 0.02439
scoring_system epss
scoring_elements 0.85176
published_at 2026-04-12T12:55:00Z
9
value 0.02439
scoring_system epss
scoring_elements 0.85173
published_at 2026-04-13T12:55:00Z
10
value 0.02439
scoring_system epss
scoring_elements 0.85194
published_at 2026-04-16T12:55:00Z
11
value 0.02439
scoring_system epss
scoring_elements 0.85196
published_at 2026-04-18T12:55:00Z
12
value 0.02439
scoring_system epss
scoring_elements 0.85195
published_at 2026-04-21T12:55:00Z
13
value 0.02439
scoring_system epss
scoring_elements 0.85218
published_at 2026-04-24T12:55:00Z
14
value 0.02439
scoring_system epss
scoring_elements 0.85227
published_at 2026-04-26T12:55:00Z
15
value 0.02439
scoring_system epss
scoring_elements 0.85224
published_at 2026-04-29T12:55:00Z
16
value 0.02439
scoring_system epss
scoring_elements 0.85238
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2786
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618120
reference_id 1618120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618120
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
reference_id CVE-2006-2786
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-33
reference_id mfsa2006-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-33
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2786
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5kr-v1tx-5kdy
6
url VCID-u63v-3cmf-ryh6
vulnerability_id VCID-u63v-3cmf-ryh6
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2775
reference_id
reference_type
scores
0
value 0.07929
scoring_system epss
scoring_elements 0.92086
published_at 2026-05-07T12:55:00Z
1
value 0.07929
scoring_system epss
scoring_elements 0.92017
published_at 2026-04-01T12:55:00Z
2
value 0.07929
scoring_system epss
scoring_elements 0.92023
published_at 2026-04-02T12:55:00Z
3
value 0.07929
scoring_system epss
scoring_elements 0.92031
published_at 2026-04-04T12:55:00Z
4
value 0.07929
scoring_system epss
scoring_elements 0.92036
published_at 2026-04-07T12:55:00Z
5
value 0.07929
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-08T12:55:00Z
6
value 0.07929
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-13T12:55:00Z
7
value 0.07929
scoring_system epss
scoring_elements 0.92055
published_at 2026-04-12T12:55:00Z
8
value 0.07929
scoring_system epss
scoring_elements 0.92067
published_at 2026-04-16T12:55:00Z
9
value 0.07929
scoring_system epss
scoring_elements 0.92064
published_at 2026-04-18T12:55:00Z
10
value 0.07929
scoring_system epss
scoring_elements 0.92062
published_at 2026-04-29T12:55:00Z
11
value 0.07929
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-24T12:55:00Z
12
value 0.07929
scoring_system epss
scoring_elements 0.92065
published_at 2026-04-26T12:55:00Z
13
value 0.07929
scoring_system epss
scoring_elements 0.92073
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2775
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775
reference_id CVE-2006-2775
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775
2
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
3
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-35
reference_id mfsa2006-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-35
5
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
6
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
7
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
8
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
9
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2775
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u63v-3cmf-ryh6
7
url VCID-ucgx-bfkb-4kg5
vulnerability_id VCID-ucgx-bfkb-4kg5
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2779
reference_id
reference_type
scores
0
value 0.23286
scoring_system epss
scoring_elements 0.95982
published_at 2026-05-07T12:55:00Z
1
value 0.23286
scoring_system epss
scoring_elements 0.95914
published_at 2026-04-01T12:55:00Z
2
value 0.23286
scoring_system epss
scoring_elements 0.95922
published_at 2026-04-02T12:55:00Z
3
value 0.23286
scoring_system epss
scoring_elements 0.9593
published_at 2026-04-04T12:55:00Z
4
value 0.23286
scoring_system epss
scoring_elements 0.95934
published_at 2026-04-07T12:55:00Z
5
value 0.23286
scoring_system epss
scoring_elements 0.95943
published_at 2026-04-08T12:55:00Z
6
value 0.23286
scoring_system epss
scoring_elements 0.95945
published_at 2026-04-09T12:55:00Z
7
value 0.23286
scoring_system epss
scoring_elements 0.95949
published_at 2026-04-12T12:55:00Z
8
value 0.23286
scoring_system epss
scoring_elements 0.95951
published_at 2026-04-13T12:55:00Z
9
value 0.23286
scoring_system epss
scoring_elements 0.95962
published_at 2026-04-16T12:55:00Z
10
value 0.23286
scoring_system epss
scoring_elements 0.95966
published_at 2026-04-18T12:55:00Z
11
value 0.23286
scoring_system epss
scoring_elements 0.95968
published_at 2026-04-24T12:55:00Z
12
value 0.23286
scoring_system epss
scoring_elements 0.95967
published_at 2026-04-29T12:55:00Z
13
value 0.23286
scoring_system epss
scoring_elements 0.95977
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2779
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618114
reference_id 1618114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
reference_id CVE-2006-2779
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-32
reference_id mfsa2006-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-32
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2779
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucgx-bfkb-4kg5
8
url VCID-xewd-ab7q-5bfs
vulnerability_id VCID-xewd-ab7q-5bfs
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2776
reference_id
reference_type
scores
0
value 0.31164
scoring_system epss
scoring_elements 0.96788
published_at 2026-05-07T12:55:00Z
1
value 0.31164
scoring_system epss
scoring_elements 0.96729
published_at 2026-04-01T12:55:00Z
2
value 0.31164
scoring_system epss
scoring_elements 0.96739
published_at 2026-04-02T12:55:00Z
3
value 0.31164
scoring_system epss
scoring_elements 0.96741
published_at 2026-04-04T12:55:00Z
4
value 0.31164
scoring_system epss
scoring_elements 0.96745
published_at 2026-04-07T12:55:00Z
5
value 0.31164
scoring_system epss
scoring_elements 0.96752
published_at 2026-04-08T12:55:00Z
6
value 0.31164
scoring_system epss
scoring_elements 0.96753
published_at 2026-04-09T12:55:00Z
7
value 0.31164
scoring_system epss
scoring_elements 0.96756
published_at 2026-04-12T12:55:00Z
8
value 0.31164
scoring_system epss
scoring_elements 0.96759
published_at 2026-04-13T12:55:00Z
9
value 0.31164
scoring_system epss
scoring_elements 0.96765
published_at 2026-04-16T12:55:00Z
10
value 0.31164
scoring_system epss
scoring_elements 0.96769
published_at 2026-04-18T12:55:00Z
11
value 0.31164
scoring_system epss
scoring_elements 0.96772
published_at 2026-04-21T12:55:00Z
12
value 0.31164
scoring_system epss
scoring_elements 0.96771
published_at 2026-04-24T12:55:00Z
13
value 0.31164
scoring_system epss
scoring_elements 0.96773
published_at 2026-04-26T12:55:00Z
14
value 0.31164
scoring_system epss
scoring_elements 0.96776
published_at 2026-04-29T12:55:00Z
15
value 0.31164
scoring_system epss
scoring_elements 0.96785
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2776
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618112
reference_id 1618112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618112
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
reference_id CVE-2006-2776
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-37
reference_id mfsa2006-37
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-37
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
purl pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4
aliases CVE-2006-2776
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xewd-ab7q-5bfs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/mail-client/mozilla-thunderbird@1.5.0.4