Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@1.0.2
Typemozilla
Namespace
NameSeaMonkey
Version1.0.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.0.3
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2khw-6pqe-n3f2
vulnerability_id VCID-2khw-6pqe-n3f2
summary
Several vulnerabilities in Mozilla Thunderbird allow cross site scripting,
    JavaScript privilege escalation and possibly execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2781
reference_id
reference_type
scores
0
value 0.07236
scoring_system epss
scoring_elements 0.91677
published_at 2026-05-09T12:55:00Z
1
value 0.07236
scoring_system epss
scoring_elements 0.9158
published_at 2026-04-01T12:55:00Z
2
value 0.07236
scoring_system epss
scoring_elements 0.91588
published_at 2026-04-02T12:55:00Z
3
value 0.07236
scoring_system epss
scoring_elements 0.91594
published_at 2026-04-04T12:55:00Z
4
value 0.07236
scoring_system epss
scoring_elements 0.91603
published_at 2026-04-07T12:55:00Z
5
value 0.07236
scoring_system epss
scoring_elements 0.91616
published_at 2026-04-08T12:55:00Z
6
value 0.07236
scoring_system epss
scoring_elements 0.91622
published_at 2026-04-09T12:55:00Z
7
value 0.07236
scoring_system epss
scoring_elements 0.91626
published_at 2026-04-13T12:55:00Z
8
value 0.07236
scoring_system epss
scoring_elements 0.91629
published_at 2026-04-12T12:55:00Z
9
value 0.07236
scoring_system epss
scoring_elements 0.91646
published_at 2026-04-24T12:55:00Z
10
value 0.07236
scoring_system epss
scoring_elements 0.91639
published_at 2026-04-21T12:55:00Z
11
value 0.07236
scoring_system epss
scoring_elements 0.91644
published_at 2026-04-26T12:55:00Z
12
value 0.07236
scoring_system epss
scoring_elements 0.91642
published_at 2026-04-29T12:55:00Z
13
value 0.07236
scoring_system epss
scoring_elements 0.91655
published_at 2026-05-05T12:55:00Z
14
value 0.07236
scoring_system epss
scoring_elements 0.91667
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2781
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=193963
reference_id 193963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=193963
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781
reference_id CVE-2006-2781
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2781
4
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-40
reference_id mfsa2006-40
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-40
6
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
7
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
8
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
9
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
10
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
11
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
12
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2781
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2khw-6pqe-n3f2
1
url VCID-anuu-bk6v-93ec
vulnerability_id VCID-anuu-bk6v-93ec
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2777
reference_id
reference_type
scores
0
value 0.35105
scoring_system epss
scoring_elements 0.97064
published_at 2026-05-09T12:55:00Z
1
value 0.35105
scoring_system epss
scoring_elements 0.97002
published_at 2026-04-01T12:55:00Z
2
value 0.35105
scoring_system epss
scoring_elements 0.9701
published_at 2026-04-02T12:55:00Z
3
value 0.35105
scoring_system epss
scoring_elements 0.97014
published_at 2026-04-07T12:55:00Z
4
value 0.35105
scoring_system epss
scoring_elements 0.97024
published_at 2026-04-09T12:55:00Z
5
value 0.35105
scoring_system epss
scoring_elements 0.97027
published_at 2026-04-11T12:55:00Z
6
value 0.35105
scoring_system epss
scoring_elements 0.97028
published_at 2026-04-12T12:55:00Z
7
value 0.35105
scoring_system epss
scoring_elements 0.97029
published_at 2026-04-13T12:55:00Z
8
value 0.35105
scoring_system epss
scoring_elements 0.97038
published_at 2026-04-16T12:55:00Z
9
value 0.35105
scoring_system epss
scoring_elements 0.97042
published_at 2026-04-18T12:55:00Z
10
value 0.35105
scoring_system epss
scoring_elements 0.97046
published_at 2026-04-21T12:55:00Z
11
value 0.35105
scoring_system epss
scoring_elements 0.97048
published_at 2026-04-24T12:55:00Z
12
value 0.35105
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-29T12:55:00Z
13
value 0.35105
scoring_system epss
scoring_elements 0.97054
published_at 2026-05-05T12:55:00Z
14
value 0.35105
scoring_system epss
scoring_elements 0.97058
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2777
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777
reference_id CVE-2006-2777
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2777
2
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
3
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-43
reference_id mfsa2006-43
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-43
4
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
5
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
6
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2777
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-anuu-bk6v-93ec
2
url VCID-bj2j-3fjg-yyhr
vulnerability_id VCID-bj2j-3fjg-yyhr
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2782
reference_id
reference_type
scores
0
value 0.01435
scoring_system epss
scoring_elements 0.80826
published_at 2026-05-09T12:55:00Z
1
value 0.01435
scoring_system epss
scoring_elements 0.80629
published_at 2026-04-01T12:55:00Z
2
value 0.01435
scoring_system epss
scoring_elements 0.80637
published_at 2026-04-02T12:55:00Z
3
value 0.01435
scoring_system epss
scoring_elements 0.80659
published_at 2026-04-04T12:55:00Z
4
value 0.01435
scoring_system epss
scoring_elements 0.80655
published_at 2026-04-07T12:55:00Z
5
value 0.01435
scoring_system epss
scoring_elements 0.80682
published_at 2026-04-08T12:55:00Z
6
value 0.01435
scoring_system epss
scoring_elements 0.80692
published_at 2026-04-09T12:55:00Z
7
value 0.01435
scoring_system epss
scoring_elements 0.80708
published_at 2026-04-11T12:55:00Z
8
value 0.01435
scoring_system epss
scoring_elements 0.80695
published_at 2026-04-12T12:55:00Z
9
value 0.01435
scoring_system epss
scoring_elements 0.80687
published_at 2026-04-13T12:55:00Z
10
value 0.01435
scoring_system epss
scoring_elements 0.80721
published_at 2026-04-16T12:55:00Z
11
value 0.01435
scoring_system epss
scoring_elements 0.80722
published_at 2026-04-18T12:55:00Z
12
value 0.01435
scoring_system epss
scoring_elements 0.80725
published_at 2026-04-21T12:55:00Z
13
value 0.01435
scoring_system epss
scoring_elements 0.80747
published_at 2026-04-24T12:55:00Z
14
value 0.01435
scoring_system epss
scoring_elements 0.80752
published_at 2026-04-26T12:55:00Z
15
value 0.01435
scoring_system epss
scoring_elements 0.80765
published_at 2026-04-29T12:55:00Z
16
value 0.01435
scoring_system epss
scoring_elements 0.80783
published_at 2026-05-05T12:55:00Z
17
value 0.01435
scoring_system epss
scoring_elements 0.80804
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2782
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618116
reference_id 1618116
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618116
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782
reference_id CVE-2006-2782
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2782
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-41
reference_id mfsa2006-41
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-41
6
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
7
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
8
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
9
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
10
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
11
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
12
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
13
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2782
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bj2j-3fjg-yyhr
3
url VCID-cggq-6c2f-1qf4
vulnerability_id VCID-cggq-6c2f-1qf4
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2778
reference_id
reference_type
scores
0
value 0.23254
scoring_system epss
scoring_elements 0.95983
published_at 2026-05-09T12:55:00Z
1
value 0.23254
scoring_system epss
scoring_elements 0.9591
published_at 2026-04-01T12:55:00Z
2
value 0.23254
scoring_system epss
scoring_elements 0.95918
published_at 2026-04-02T12:55:00Z
3
value 0.23254
scoring_system epss
scoring_elements 0.95926
published_at 2026-04-04T12:55:00Z
4
value 0.23254
scoring_system epss
scoring_elements 0.9593
published_at 2026-04-07T12:55:00Z
5
value 0.23254
scoring_system epss
scoring_elements 0.95939
published_at 2026-04-08T12:55:00Z
6
value 0.23254
scoring_system epss
scoring_elements 0.95941
published_at 2026-04-09T12:55:00Z
7
value 0.23254
scoring_system epss
scoring_elements 0.95945
published_at 2026-04-12T12:55:00Z
8
value 0.23254
scoring_system epss
scoring_elements 0.95947
published_at 2026-04-13T12:55:00Z
9
value 0.23254
scoring_system epss
scoring_elements 0.95958
published_at 2026-04-16T12:55:00Z
10
value 0.23254
scoring_system epss
scoring_elements 0.95962
published_at 2026-04-18T12:55:00Z
11
value 0.23254
scoring_system epss
scoring_elements 0.95964
published_at 2026-04-29T12:55:00Z
12
value 0.23254
scoring_system epss
scoring_elements 0.95965
published_at 2026-04-24T12:55:00Z
13
value 0.23254
scoring_system epss
scoring_elements 0.95974
published_at 2026-05-05T12:55:00Z
14
value 0.23254
scoring_system epss
scoring_elements 0.95979
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2778
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618113
reference_id 1618113
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618113
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
reference_id CVE-2006-2778
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2778
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-38
reference_id mfsa2006-38
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-38
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2778
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cggq-6c2f-1qf4
4
url VCID-gs89-ejt1-q7db
vulnerability_id VCID-gs89-ejt1-q7db
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2783
reference_id
reference_type
scores
0
value 0.04975
scoring_system epss
scoring_elements 0.89751
published_at 2026-05-09T12:55:00Z
1
value 0.04975
scoring_system epss
scoring_elements 0.89645
published_at 2026-04-01T12:55:00Z
2
value 0.04975
scoring_system epss
scoring_elements 0.89647
published_at 2026-04-02T12:55:00Z
3
value 0.04975
scoring_system epss
scoring_elements 0.89662
published_at 2026-04-04T12:55:00Z
4
value 0.04975
scoring_system epss
scoring_elements 0.89664
published_at 2026-04-07T12:55:00Z
5
value 0.04975
scoring_system epss
scoring_elements 0.89681
published_at 2026-04-08T12:55:00Z
6
value 0.04975
scoring_system epss
scoring_elements 0.89687
published_at 2026-04-09T12:55:00Z
7
value 0.04975
scoring_system epss
scoring_elements 0.89694
published_at 2026-04-11T12:55:00Z
8
value 0.04975
scoring_system epss
scoring_elements 0.89693
published_at 2026-04-12T12:55:00Z
9
value 0.04975
scoring_system epss
scoring_elements 0.89686
published_at 2026-04-13T12:55:00Z
10
value 0.04975
scoring_system epss
scoring_elements 0.89702
published_at 2026-04-16T12:55:00Z
11
value 0.04975
scoring_system epss
scoring_elements 0.89703
published_at 2026-04-18T12:55:00Z
12
value 0.04975
scoring_system epss
scoring_elements 0.89697
published_at 2026-04-21T12:55:00Z
13
value 0.04975
scoring_system epss
scoring_elements 0.89713
published_at 2026-04-24T12:55:00Z
14
value 0.04975
scoring_system epss
scoring_elements 0.89715
published_at 2026-04-26T12:55:00Z
15
value 0.04975
scoring_system epss
scoring_elements 0.89714
published_at 2026-04-29T12:55:00Z
16
value 0.04975
scoring_system epss
scoring_elements 0.89725
published_at 2026-05-05T12:55:00Z
17
value 0.04975
scoring_system epss
scoring_elements 0.89739
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2783
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618117
reference_id 1618117
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618117
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
reference_id CVE-2006-2783
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-42
reference_id mfsa2006-42
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-42
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2783
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gs89-ejt1-q7db
5
url VCID-kbyn-rze5-2qeg
vulnerability_id VCID-kbyn-rze5-2qeg
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2787.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2787
reference_id
reference_type
scores
0
value 0.09158
scoring_system epss
scoring_elements 0.92737
published_at 2026-05-09T12:55:00Z
1
value 0.09158
scoring_system epss
scoring_elements 0.92655
published_at 2026-04-01T12:55:00Z
2
value 0.09158
scoring_system epss
scoring_elements 0.92662
published_at 2026-04-02T12:55:00Z
3
value 0.09158
scoring_system epss
scoring_elements 0.92668
published_at 2026-04-07T12:55:00Z
4
value 0.09158
scoring_system epss
scoring_elements 0.92678
published_at 2026-04-08T12:55:00Z
5
value 0.09158
scoring_system epss
scoring_elements 0.92683
published_at 2026-04-09T12:55:00Z
6
value 0.09158
scoring_system epss
scoring_elements 0.92689
published_at 2026-04-11T12:55:00Z
7
value 0.09158
scoring_system epss
scoring_elements 0.92688
published_at 2026-04-12T12:55:00Z
8
value 0.09158
scoring_system epss
scoring_elements 0.92687
published_at 2026-04-13T12:55:00Z
9
value 0.09158
scoring_system epss
scoring_elements 0.92701
published_at 2026-04-18T12:55:00Z
10
value 0.09158
scoring_system epss
scoring_elements 0.92705
published_at 2026-04-21T12:55:00Z
11
value 0.09158
scoring_system epss
scoring_elements 0.92708
published_at 2026-04-26T12:55:00Z
12
value 0.09158
scoring_system epss
scoring_elements 0.92704
published_at 2026-04-29T12:55:00Z
13
value 0.09158
scoring_system epss
scoring_elements 0.92712
published_at 2026-05-05T12:55:00Z
14
value 0.09158
scoring_system epss
scoring_elements 0.92726
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2787
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618121
reference_id 1618121
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618121
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
reference_id CVE-2006-2787
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2787
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-31
reference_id mfsa2006-31
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-31
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2787
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbyn-rze5-2qeg
6
url VCID-nnxw-14g9-77da
vulnerability_id VCID-nnxw-14g9-77da
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2785
reference_id
reference_type
scores
0
value 0.02013
scoring_system epss
scoring_elements 0.83855
published_at 2026-05-09T12:55:00Z
1
value 0.02013
scoring_system epss
scoring_elements 0.83654
published_at 2026-04-01T12:55:00Z
2
value 0.02013
scoring_system epss
scoring_elements 0.83667
published_at 2026-04-02T12:55:00Z
3
value 0.02013
scoring_system epss
scoring_elements 0.83681
published_at 2026-04-04T12:55:00Z
4
value 0.02013
scoring_system epss
scoring_elements 0.83684
published_at 2026-04-07T12:55:00Z
5
value 0.02013
scoring_system epss
scoring_elements 0.83707
published_at 2026-04-08T12:55:00Z
6
value 0.02013
scoring_system epss
scoring_elements 0.83714
published_at 2026-04-09T12:55:00Z
7
value 0.02013
scoring_system epss
scoring_elements 0.8373
published_at 2026-04-11T12:55:00Z
8
value 0.02013
scoring_system epss
scoring_elements 0.83724
published_at 2026-04-12T12:55:00Z
9
value 0.02013
scoring_system epss
scoring_elements 0.83719
published_at 2026-04-13T12:55:00Z
10
value 0.02013
scoring_system epss
scoring_elements 0.83754
published_at 2026-04-18T12:55:00Z
11
value 0.02013
scoring_system epss
scoring_elements 0.83755
published_at 2026-04-21T12:55:00Z
12
value 0.02013
scoring_system epss
scoring_elements 0.83779
published_at 2026-04-24T12:55:00Z
13
value 0.02013
scoring_system epss
scoring_elements 0.83787
published_at 2026-04-26T12:55:00Z
14
value 0.02013
scoring_system epss
scoring_elements 0.83795
published_at 2026-04-29T12:55:00Z
15
value 0.02013
scoring_system epss
scoring_elements 0.83817
published_at 2026-05-05T12:55:00Z
16
value 0.02013
scoring_system epss
scoring_elements 0.83838
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2785
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618119
reference_id 1618119
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618119
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785
reference_id CVE-2006-2785
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2785
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-34
reference_id mfsa2006-34
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-34
6
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
7
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
8
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
9
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
10
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
11
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
12
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
13
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2785
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nnxw-14g9-77da
7
url VCID-t5kr-v1tx-5kdy
vulnerability_id VCID-t5kr-v1tx-5kdy
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2786.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2786
reference_id
reference_type
scores
0
value 0.02439
scoring_system epss
scoring_elements 0.85284
published_at 2026-05-09T12:55:00Z
1
value 0.02439
scoring_system epss
scoring_elements 0.85101
published_at 2026-04-01T12:55:00Z
2
value 0.02439
scoring_system epss
scoring_elements 0.85113
published_at 2026-04-02T12:55:00Z
3
value 0.02439
scoring_system epss
scoring_elements 0.85131
published_at 2026-04-04T12:55:00Z
4
value 0.02439
scoring_system epss
scoring_elements 0.85135
published_at 2026-04-07T12:55:00Z
5
value 0.02439
scoring_system epss
scoring_elements 0.85157
published_at 2026-04-08T12:55:00Z
6
value 0.02439
scoring_system epss
scoring_elements 0.85164
published_at 2026-04-09T12:55:00Z
7
value 0.02439
scoring_system epss
scoring_elements 0.85179
published_at 2026-04-11T12:55:00Z
8
value 0.02439
scoring_system epss
scoring_elements 0.85176
published_at 2026-04-12T12:55:00Z
9
value 0.02439
scoring_system epss
scoring_elements 0.85173
published_at 2026-04-13T12:55:00Z
10
value 0.02439
scoring_system epss
scoring_elements 0.85194
published_at 2026-04-16T12:55:00Z
11
value 0.02439
scoring_system epss
scoring_elements 0.85196
published_at 2026-04-18T12:55:00Z
12
value 0.02439
scoring_system epss
scoring_elements 0.85195
published_at 2026-04-21T12:55:00Z
13
value 0.02439
scoring_system epss
scoring_elements 0.85218
published_at 2026-04-24T12:55:00Z
14
value 0.02439
scoring_system epss
scoring_elements 0.85227
published_at 2026-04-26T12:55:00Z
15
value 0.02439
scoring_system epss
scoring_elements 0.85224
published_at 2026-04-29T12:55:00Z
16
value 0.02439
scoring_system epss
scoring_elements 0.85238
published_at 2026-05-05T12:55:00Z
17
value 0.02439
scoring_system epss
scoring_elements 0.85264
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2786
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618120
reference_id 1618120
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618120
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
reference_id CVE-2006-2786
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2786
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-33
reference_id mfsa2006-33
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-33
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2786
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t5kr-v1tx-5kdy
8
url VCID-u63v-3cmf-ryh6
vulnerability_id VCID-u63v-3cmf-ryh6
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2775
reference_id
reference_type
scores
0
value 0.07929
scoring_system epss
scoring_elements 0.92095
published_at 2026-05-09T12:55:00Z
1
value 0.07929
scoring_system epss
scoring_elements 0.92017
published_at 2026-04-01T12:55:00Z
2
value 0.07929
scoring_system epss
scoring_elements 0.92023
published_at 2026-04-02T12:55:00Z
3
value 0.07929
scoring_system epss
scoring_elements 0.92031
published_at 2026-04-04T12:55:00Z
4
value 0.07929
scoring_system epss
scoring_elements 0.92036
published_at 2026-04-07T12:55:00Z
5
value 0.07929
scoring_system epss
scoring_elements 0.92048
published_at 2026-04-08T12:55:00Z
6
value 0.07929
scoring_system epss
scoring_elements 0.92051
published_at 2026-04-13T12:55:00Z
7
value 0.07929
scoring_system epss
scoring_elements 0.92055
published_at 2026-04-12T12:55:00Z
8
value 0.07929
scoring_system epss
scoring_elements 0.92067
published_at 2026-04-16T12:55:00Z
9
value 0.07929
scoring_system epss
scoring_elements 0.92064
published_at 2026-04-18T12:55:00Z
10
value 0.07929
scoring_system epss
scoring_elements 0.92062
published_at 2026-04-29T12:55:00Z
11
value 0.07929
scoring_system epss
scoring_elements 0.92066
published_at 2026-04-24T12:55:00Z
12
value 0.07929
scoring_system epss
scoring_elements 0.92065
published_at 2026-04-26T12:55:00Z
13
value 0.07929
scoring_system epss
scoring_elements 0.92073
published_at 2026-05-05T12:55:00Z
14
value 0.07929
scoring_system epss
scoring_elements 0.92086
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2775
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775
reference_id CVE-2006-2775
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2775
2
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
3
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-35
reference_id mfsa2006-35
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-35
5
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
6
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
7
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
8
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
9
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2775
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u63v-3cmf-ryh6
9
url VCID-ucgx-bfkb-4kg5
vulnerability_id VCID-ucgx-bfkb-4kg5
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2779
reference_id
reference_type
scores
0
value 0.23286
scoring_system epss
scoring_elements 0.95986
published_at 2026-05-09T12:55:00Z
1
value 0.23286
scoring_system epss
scoring_elements 0.95914
published_at 2026-04-01T12:55:00Z
2
value 0.23286
scoring_system epss
scoring_elements 0.95922
published_at 2026-04-02T12:55:00Z
3
value 0.23286
scoring_system epss
scoring_elements 0.9593
published_at 2026-04-04T12:55:00Z
4
value 0.23286
scoring_system epss
scoring_elements 0.95934
published_at 2026-04-07T12:55:00Z
5
value 0.23286
scoring_system epss
scoring_elements 0.95943
published_at 2026-04-08T12:55:00Z
6
value 0.23286
scoring_system epss
scoring_elements 0.95945
published_at 2026-04-09T12:55:00Z
7
value 0.23286
scoring_system epss
scoring_elements 0.95949
published_at 2026-04-12T12:55:00Z
8
value 0.23286
scoring_system epss
scoring_elements 0.95951
published_at 2026-04-13T12:55:00Z
9
value 0.23286
scoring_system epss
scoring_elements 0.95962
published_at 2026-04-16T12:55:00Z
10
value 0.23286
scoring_system epss
scoring_elements 0.95966
published_at 2026-04-18T12:55:00Z
11
value 0.23286
scoring_system epss
scoring_elements 0.95968
published_at 2026-04-24T12:55:00Z
12
value 0.23286
scoring_system epss
scoring_elements 0.95967
published_at 2026-04-29T12:55:00Z
13
value 0.23286
scoring_system epss
scoring_elements 0.95977
published_at 2026-05-05T12:55:00Z
14
value 0.23286
scoring_system epss
scoring_elements 0.95982
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2779
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618114
reference_id 1618114
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618114
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
reference_id CVE-2006-2779
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2779
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-32
reference_id mfsa2006-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-32
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2779
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ucgx-bfkb-4kg5
10
url VCID-xewd-ab7q-5bfs
vulnerability_id VCID-xewd-ab7q-5bfs
summary
Vulnerabilities in Mozilla Firefox allow privilege escalations for
    JavaScript code, cross site scripting attacks, HTTP response smuggling and
    possibly the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-2776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-2776
reference_id
reference_type
scores
0
value 0.31164
scoring_system epss
scoring_elements 0.96793
published_at 2026-05-09T12:55:00Z
1
value 0.31164
scoring_system epss
scoring_elements 0.96729
published_at 2026-04-01T12:55:00Z
2
value 0.31164
scoring_system epss
scoring_elements 0.96739
published_at 2026-04-02T12:55:00Z
3
value 0.31164
scoring_system epss
scoring_elements 0.96741
published_at 2026-04-04T12:55:00Z
4
value 0.31164
scoring_system epss
scoring_elements 0.96745
published_at 2026-04-07T12:55:00Z
5
value 0.31164
scoring_system epss
scoring_elements 0.96752
published_at 2026-04-08T12:55:00Z
6
value 0.31164
scoring_system epss
scoring_elements 0.96753
published_at 2026-04-09T12:55:00Z
7
value 0.31164
scoring_system epss
scoring_elements 0.96756
published_at 2026-04-12T12:55:00Z
8
value 0.31164
scoring_system epss
scoring_elements 0.96759
published_at 2026-04-13T12:55:00Z
9
value 0.31164
scoring_system epss
scoring_elements 0.96765
published_at 2026-04-16T12:55:00Z
10
value 0.31164
scoring_system epss
scoring_elements 0.96769
published_at 2026-04-18T12:55:00Z
11
value 0.31164
scoring_system epss
scoring_elements 0.96772
published_at 2026-04-21T12:55:00Z
12
value 0.31164
scoring_system epss
scoring_elements 0.96771
published_at 2026-04-24T12:55:00Z
13
value 0.31164
scoring_system epss
scoring_elements 0.96773
published_at 2026-04-26T12:55:00Z
14
value 0.31164
scoring_system epss
scoring_elements 0.96776
published_at 2026-04-29T12:55:00Z
15
value 0.31164
scoring_system epss
scoring_elements 0.96785
published_at 2026-05-05T12:55:00Z
16
value 0.31164
scoring_system epss
scoring_elements 0.96788
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-2776
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618112
reference_id 1618112
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618112
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
reference_id CVE-2006-2776
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2776
4
reference_url https://security.gentoo.org/glsa/200606-12
reference_id GLSA-200606-12
reference_type
scores
url https://security.gentoo.org/glsa/200606-12
5
reference_url https://security.gentoo.org/glsa/200606-21
reference_id GLSA-200606-21
reference_type
scores
url https://security.gentoo.org/glsa/200606-21
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-37
reference_id mfsa2006-37
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-37
7
reference_url https://access.redhat.com/errata/RHSA-2006:0578
reference_id RHSA-2006:0578
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0578
8
reference_url https://access.redhat.com/errata/RHSA-2006:0594
reference_id RHSA-2006:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0594
9
reference_url https://access.redhat.com/errata/RHSA-2006:0609
reference_id RHSA-2006:0609
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0609
10
reference_url https://access.redhat.com/errata/RHSA-2006:0610
reference_id RHSA-2006:0610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0610
11
reference_url https://access.redhat.com/errata/RHSA-2006:0611
reference_id RHSA-2006:0611
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0611
12
reference_url https://usn.ubuntu.com/296-1/
reference_id USN-296-1
reference_type
scores
url https://usn.ubuntu.com/296-1/
13
reference_url https://usn.ubuntu.com/296-2/
reference_id USN-296-2
reference_type
scores
url https://usn.ubuntu.com/296-2/
14
reference_url https://usn.ubuntu.com/297-1/
reference_id USN-297-1
reference_type
scores
url https://usn.ubuntu.com/297-1/
15
reference_url https://usn.ubuntu.com/297-3/
reference_id USN-297-3
reference_type
scores
url https://usn.ubuntu.com/297-3/
16
reference_url https://usn.ubuntu.com/323-1/
reference_id USN-323-1
reference_type
scores
url https://usn.ubuntu.com/323-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-2776
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xewd-ab7q-5bfs
11
url VCID-z23q-ts2f-17a3
vulnerability_id VCID-z23q-ts2f-17a3
summary
Normally Mozilla-based clients prevent web content from linking to local files
but Eric Foley reports a partial bypass of this restriction by using Windows
filename syntax (on a Windows computer) rather than a file:/// URL as the
SRC= attribute. The image will not be loaded on the web page--it will appear as
a broken image--but if a user can be convinced to right-click and select
"View Image" then the content will be loaded. Since the image will replace
the current document attacker script cannot be run on it. Loading a local
file at a known location is about the extent of this attack.If the local file is a media file an external helper program may be launched
to play the media depending on your settings. The action will be the same
as if you had clicked on a remote link of the same media type and does not
present any additional risk. Local files identified as executable will
never be opened in this way, with "executable" broadly
defined on windows to include many scriptable document formats with a history
of being abused.By referencing a local device rather than a file this could be used
as a limited denial-of-service attack to hang the browser.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-1942
reference_id
reference_type
scores
0
value 0.0294
scoring_system epss
scoring_elements 0.86535
published_at 2026-05-09T12:55:00Z
1
value 0.0294
scoring_system epss
scoring_elements 0.86371
published_at 2026-04-01T12:55:00Z
2
value 0.0294
scoring_system epss
scoring_elements 0.86381
published_at 2026-04-02T12:55:00Z
3
value 0.0294
scoring_system epss
scoring_elements 0.86398
published_at 2026-04-04T12:55:00Z
4
value 0.0294
scoring_system epss
scoring_elements 0.864
published_at 2026-04-07T12:55:00Z
5
value 0.0294
scoring_system epss
scoring_elements 0.86419
published_at 2026-04-08T12:55:00Z
6
value 0.0294
scoring_system epss
scoring_elements 0.86429
published_at 2026-04-09T12:55:00Z
7
value 0.0294
scoring_system epss
scoring_elements 0.86443
published_at 2026-04-11T12:55:00Z
8
value 0.0294
scoring_system epss
scoring_elements 0.86442
published_at 2026-04-12T12:55:00Z
9
value 0.0294
scoring_system epss
scoring_elements 0.86436
published_at 2026-04-13T12:55:00Z
10
value 0.0294
scoring_system epss
scoring_elements 0.86453
published_at 2026-04-16T12:55:00Z
11
value 0.0294
scoring_system epss
scoring_elements 0.86457
published_at 2026-04-18T12:55:00Z
12
value 0.0294
scoring_system epss
scoring_elements 0.86451
published_at 2026-04-21T12:55:00Z
13
value 0.0294
scoring_system epss
scoring_elements 0.8647
published_at 2026-04-24T12:55:00Z
14
value 0.0294
scoring_system epss
scoring_elements 0.8648
published_at 2026-04-26T12:55:00Z
15
value 0.0294
scoring_system epss
scoring_elements 0.86478
published_at 2026-04-29T12:55:00Z
16
value 0.0294
scoring_system epss
scoring_elements 0.86498
published_at 2026-05-05T12:55:00Z
17
value 0.0294
scoring_system epss
scoring_elements 0.86517
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-1942
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1942
reference_id CVE-2006-1942
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1942
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2006-39
reference_id mfsa2006-39
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2006-39
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.0.2
purl pkg:mozilla/SeaMonkey@1.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2
aliases CVE-2006-1942
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z23q-ts2f-17a3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.0.2