Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/xulrunner@1.9.2.26-1?arch=el6_2
Typerpm
Namespaceredhat
Namexulrunner
Version1.9.2.26-1
Qualifiers
arch el6_2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-257z-4see-pkcv
vulnerability_id VCID-257z-4see-pkcv
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0449.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0449.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0449
reference_id
reference_type
scores
0
value 0.03949
scoring_system epss
scoring_elements 0.88377
published_at 2026-04-24T12:55:00Z
1
value 0.03949
scoring_system epss
scoring_elements 0.88296
published_at 2026-04-01T12:55:00Z
2
value 0.03949
scoring_system epss
scoring_elements 0.88304
published_at 2026-04-02T12:55:00Z
3
value 0.03949
scoring_system epss
scoring_elements 0.88319
published_at 2026-04-04T12:55:00Z
4
value 0.03949
scoring_system epss
scoring_elements 0.88323
published_at 2026-04-07T12:55:00Z
5
value 0.03949
scoring_system epss
scoring_elements 0.88343
published_at 2026-04-08T12:55:00Z
6
value 0.03949
scoring_system epss
scoring_elements 0.88349
published_at 2026-04-09T12:55:00Z
7
value 0.03949
scoring_system epss
scoring_elements 0.88359
published_at 2026-04-11T12:55:00Z
8
value 0.03949
scoring_system epss
scoring_elements 0.88351
published_at 2026-04-13T12:55:00Z
9
value 0.03949
scoring_system epss
scoring_elements 0.88364
published_at 2026-04-16T12:55:00Z
10
value 0.03949
scoring_system epss
scoring_elements 0.88361
published_at 2026-04-18T12:55:00Z
11
value 0.03949
scoring_system epss
scoring_elements 0.8836
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0449
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785966
reference_id 785966
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785966
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449
reference_id CVE-2012-0449
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-08
reference_id mfsa2012-08
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-08
6
reference_url https://access.redhat.com/errata/RHSA-2012:0079
reference_id RHSA-2012:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0079
7
reference_url https://access.redhat.com/errata/RHSA-2012:0080
reference_id RHSA-2012:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0080
8
reference_url https://usn.ubuntu.com/1350-1/
reference_id USN-1350-1
reference_type
scores
url https://usn.ubuntu.com/1350-1/
9
reference_url https://usn.ubuntu.com/1353-1/
reference_id USN-1353-1
reference_type
scores
url https://usn.ubuntu.com/1353-1/
10
reference_url https://usn.ubuntu.com/1355-1/
reference_id USN-1355-1
reference_type
scores
url https://usn.ubuntu.com/1355-1/
11
reference_url https://usn.ubuntu.com/1369-1/
reference_id USN-1369-1
reference_type
scores
url https://usn.ubuntu.com/1369-1/
fixed_packages
aliases CVE-2012-0449
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-257z-4see-pkcv
1
url VCID-fgjh-rppt-9ubg
vulnerability_id VCID-fgjh-rppt-9ubg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0442.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0442.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0442
reference_id
reference_type
scores
0
value 0.01441
scoring_system epss
scoring_elements 0.80785
published_at 2026-04-24T12:55:00Z
1
value 0.01441
scoring_system epss
scoring_elements 0.80665
published_at 2026-04-01T12:55:00Z
2
value 0.01441
scoring_system epss
scoring_elements 0.80673
published_at 2026-04-02T12:55:00Z
3
value 0.01441
scoring_system epss
scoring_elements 0.80694
published_at 2026-04-04T12:55:00Z
4
value 0.01441
scoring_system epss
scoring_elements 0.8069
published_at 2026-04-07T12:55:00Z
5
value 0.01441
scoring_system epss
scoring_elements 0.80718
published_at 2026-04-08T12:55:00Z
6
value 0.01441
scoring_system epss
scoring_elements 0.80728
published_at 2026-04-09T12:55:00Z
7
value 0.01441
scoring_system epss
scoring_elements 0.80744
published_at 2026-04-11T12:55:00Z
8
value 0.01441
scoring_system epss
scoring_elements 0.8073
published_at 2026-04-12T12:55:00Z
9
value 0.01441
scoring_system epss
scoring_elements 0.80722
published_at 2026-04-13T12:55:00Z
10
value 0.01441
scoring_system epss
scoring_elements 0.80759
published_at 2026-04-16T12:55:00Z
11
value 0.01441
scoring_system epss
scoring_elements 0.8076
published_at 2026-04-18T12:55:00Z
12
value 0.01441
scoring_system epss
scoring_elements 0.80762
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0442
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785085
reference_id 785085
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785085
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442
reference_id CVE-2012-0442
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-01
reference_id mfsa2012-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-01
6
reference_url https://access.redhat.com/errata/RHSA-2012:0079
reference_id RHSA-2012:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0079
7
reference_url https://access.redhat.com/errata/RHSA-2012:0080
reference_id RHSA-2012:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0080
8
reference_url https://access.redhat.com/errata/RHSA-2012:0084
reference_id RHSA-2012:0084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0084
9
reference_url https://access.redhat.com/errata/RHSA-2012:0085
reference_id RHSA-2012:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0085
10
reference_url https://usn.ubuntu.com/1350-1/
reference_id USN-1350-1
reference_type
scores
url https://usn.ubuntu.com/1350-1/
11
reference_url https://usn.ubuntu.com/1353-1/
reference_id USN-1353-1
reference_type
scores
url https://usn.ubuntu.com/1353-1/
12
reference_url https://usn.ubuntu.com/1355-1/
reference_id USN-1355-1
reference_type
scores
url https://usn.ubuntu.com/1355-1/
13
reference_url https://usn.ubuntu.com/1369-1/
reference_id USN-1369-1
reference_type
scores
url https://usn.ubuntu.com/1369-1/
fixed_packages
aliases CVE-2012-0442
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fgjh-rppt-9ubg
2
url VCID-ftcu-7muq-xbbr
vulnerability_id VCID-ftcu-7muq-xbbr
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3659
reference_id
reference_type
scores
0
value 0.73146
scoring_system epss
scoring_elements 0.98798
published_at 2026-04-24T12:55:00Z
1
value 0.73146
scoring_system epss
scoring_elements 0.98777
published_at 2026-04-01T12:55:00Z
2
value 0.73146
scoring_system epss
scoring_elements 0.98778
published_at 2026-04-02T12:55:00Z
3
value 0.73146
scoring_system epss
scoring_elements 0.98781
published_at 2026-04-04T12:55:00Z
4
value 0.73146
scoring_system epss
scoring_elements 0.98784
published_at 2026-04-09T12:55:00Z
5
value 0.73146
scoring_system epss
scoring_elements 0.98785
published_at 2026-04-08T12:55:00Z
6
value 0.73146
scoring_system epss
scoring_elements 0.98787
published_at 2026-04-11T12:55:00Z
7
value 0.73146
scoring_system epss
scoring_elements 0.98788
published_at 2026-04-12T12:55:00Z
8
value 0.73146
scoring_system epss
scoring_elements 0.98789
published_at 2026-04-13T12:55:00Z
9
value 0.73146
scoring_system epss
scoring_elements 0.98793
published_at 2026-04-18T12:55:00Z
10
value 0.73146
scoring_system epss
scoring_elements 0.98795
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3659
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=786258
reference_id 786258
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=786258
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659
reference_id CVE-2011-3659
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18870.rb
reference_id CVE-2011-3659;OSVDB-78736
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18870.rb
5
reference_url http://www.zerodayinitiative.com/advisories/upcoming/ZDI-CAN-1413
reference_id CVE-2011-3659;OSVDB-78736
reference_type exploit
scores
url http://www.zerodayinitiative.com/advisories/upcoming/ZDI-CAN-1413
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-04
reference_id mfsa2012-04
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-04
8
reference_url https://access.redhat.com/errata/RHSA-2012:0079
reference_id RHSA-2012:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0079
9
reference_url https://access.redhat.com/errata/RHSA-2012:0080
reference_id RHSA-2012:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0080
10
reference_url https://usn.ubuntu.com/1350-1/
reference_id USN-1350-1
reference_type
scores
url https://usn.ubuntu.com/1350-1/
11
reference_url https://usn.ubuntu.com/1353-1/
reference_id USN-1353-1
reference_type
scores
url https://usn.ubuntu.com/1353-1/
12
reference_url https://usn.ubuntu.com/1355-1/
reference_id USN-1355-1
reference_type
scores
url https://usn.ubuntu.com/1355-1/
13
reference_url https://usn.ubuntu.com/1369-1/
reference_id USN-1369-1
reference_type
scores
url https://usn.ubuntu.com/1369-1/
fixed_packages
aliases CVE-2011-3659
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ftcu-7muq-xbbr
3
url VCID-gajm-zb2s-ukgz
vulnerability_id VCID-gajm-zb2s-ukgz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0444.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0444
reference_id
reference_type
scores
0
value 0.08566
scoring_system epss
scoring_elements 0.92425
published_at 2026-04-24T12:55:00Z
1
value 0.08566
scoring_system epss
scoring_elements 0.92368
published_at 2026-04-01T12:55:00Z
2
value 0.08566
scoring_system epss
scoring_elements 0.92375
published_at 2026-04-02T12:55:00Z
3
value 0.08566
scoring_system epss
scoring_elements 0.92382
published_at 2026-04-04T12:55:00Z
4
value 0.08566
scoring_system epss
scoring_elements 0.92386
published_at 2026-04-07T12:55:00Z
5
value 0.08566
scoring_system epss
scoring_elements 0.92398
published_at 2026-04-08T12:55:00Z
6
value 0.08566
scoring_system epss
scoring_elements 0.92402
published_at 2026-04-09T12:55:00Z
7
value 0.08566
scoring_system epss
scoring_elements 0.92408
published_at 2026-04-11T12:55:00Z
8
value 0.08566
scoring_system epss
scoring_elements 0.92411
published_at 2026-04-12T12:55:00Z
9
value 0.08566
scoring_system epss
scoring_elements 0.92409
published_at 2026-04-13T12:55:00Z
10
value 0.08566
scoring_system epss
scoring_elements 0.9242
published_at 2026-04-16T12:55:00Z
11
value 0.08566
scoring_system epss
scoring_elements 0.92419
published_at 2026-04-18T12:55:00Z
12
value 0.08566
scoring_system epss
scoring_elements 0.92421
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0444
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664197
reference_id 664197
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=664197
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=786026
reference_id 786026
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=786026
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444
reference_id CVE-2012-0444
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-07
reference_id mfsa2012-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-07
8
reference_url https://access.redhat.com/errata/RHSA-2012:0079
reference_id RHSA-2012:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0079
9
reference_url https://access.redhat.com/errata/RHSA-2012:0136
reference_id RHSA-2012:0136
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0136
10
reference_url https://usn.ubuntu.com/1350-1/
reference_id USN-1350-1
reference_type
scores
url https://usn.ubuntu.com/1350-1/
11
reference_url https://usn.ubuntu.com/1353-1/
reference_id USN-1353-1
reference_type
scores
url https://usn.ubuntu.com/1353-1/
12
reference_url https://usn.ubuntu.com/1355-1/
reference_id USN-1355-1
reference_type
scores
url https://usn.ubuntu.com/1355-1/
13
reference_url https://usn.ubuntu.com/1369-1/
reference_id USN-1369-1
reference_type
scores
url https://usn.ubuntu.com/1369-1/
14
reference_url https://usn.ubuntu.com/1370-1/
reference_id USN-1370-1
reference_type
scores
url https://usn.ubuntu.com/1370-1/
fixed_packages
aliases CVE-2012-0444
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gajm-zb2s-ukgz
4
url VCID-k4pt-fp2s-1fhb
vulnerability_id VCID-k4pt-fp2s-1fhb
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3670.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3670.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-3670
reference_id
reference_type
scores
0
value 0.00725
scoring_system epss
scoring_elements 0.72648
published_at 2026-04-24T12:55:00Z
1
value 0.00725
scoring_system epss
scoring_elements 0.72516
published_at 2026-04-07T12:55:00Z
2
value 0.00725
scoring_system epss
scoring_elements 0.72523
published_at 2026-04-02T12:55:00Z
3
value 0.00725
scoring_system epss
scoring_elements 0.72539
published_at 2026-04-04T12:55:00Z
4
value 0.00725
scoring_system epss
scoring_elements 0.72554
published_at 2026-04-08T12:55:00Z
5
value 0.00725
scoring_system epss
scoring_elements 0.72566
published_at 2026-04-09T12:55:00Z
6
value 0.00725
scoring_system epss
scoring_elements 0.7259
published_at 2026-04-11T12:55:00Z
7
value 0.00725
scoring_system epss
scoring_elements 0.72573
published_at 2026-04-12T12:55:00Z
8
value 0.00725
scoring_system epss
scoring_elements 0.72563
published_at 2026-04-13T12:55:00Z
9
value 0.00725
scoring_system epss
scoring_elements 0.72605
published_at 2026-04-16T12:55:00Z
10
value 0.00725
scoring_system epss
scoring_elements 0.72615
published_at 2026-04-18T12:55:00Z
11
value 0.00725
scoring_system epss
scoring_elements 0.72606
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-3670
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=785464
reference_id 785464
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=785464
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3670
reference_id CVE-2011-3670
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3670
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-02
reference_id mfsa2012-02
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-02
6
reference_url https://access.redhat.com/errata/RHSA-2012:0079
reference_id RHSA-2012:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0079
7
reference_url https://access.redhat.com/errata/RHSA-2012:0080
reference_id RHSA-2012:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0080
8
reference_url https://access.redhat.com/errata/RHSA-2012:0084
reference_id RHSA-2012:0084
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0084
9
reference_url https://access.redhat.com/errata/RHSA-2012:0085
reference_id RHSA-2012:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0085
10
reference_url https://usn.ubuntu.com/1350-1/
reference_id USN-1350-1
reference_type
scores
url https://usn.ubuntu.com/1350-1/
11
reference_url https://usn.ubuntu.com/1353-1/
reference_id USN-1353-1
reference_type
scores
url https://usn.ubuntu.com/1353-1/
fixed_packages
aliases CVE-2011-3670
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4pt-fp2s-1fhb
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@1.9.2.26-1%3Farch=el6_2