Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/seamonkey@1.0.9-0.50?arch=el3
Typerpm
Namespaceredhat
Nameseamonkey
Version1.0.9-0.50
Qualifiers
arch el3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-89ja-f5vc-83d3
vulnerability_id VCID-89ja-f5vc-83d3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0159.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0159.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0159
reference_id
reference_type
scores
0
value 0.02476
scoring_system epss
scoring_elements 0.85321
published_at 2026-04-24T12:55:00Z
1
value 0.02476
scoring_system epss
scoring_elements 0.85209
published_at 2026-04-01T12:55:00Z
2
value 0.02476
scoring_system epss
scoring_elements 0.8522
published_at 2026-04-02T12:55:00Z
3
value 0.02476
scoring_system epss
scoring_elements 0.85239
published_at 2026-04-04T12:55:00Z
4
value 0.02476
scoring_system epss
scoring_elements 0.85241
published_at 2026-04-07T12:55:00Z
5
value 0.02476
scoring_system epss
scoring_elements 0.85263
published_at 2026-04-08T12:55:00Z
6
value 0.02476
scoring_system epss
scoring_elements 0.85271
published_at 2026-04-09T12:55:00Z
7
value 0.02476
scoring_system epss
scoring_elements 0.85285
published_at 2026-04-11T12:55:00Z
8
value 0.02476
scoring_system epss
scoring_elements 0.85283
published_at 2026-04-12T12:55:00Z
9
value 0.02476
scoring_system epss
scoring_elements 0.8528
published_at 2026-04-13T12:55:00Z
10
value 0.02476
scoring_system epss
scoring_elements 0.85301
published_at 2026-04-16T12:55:00Z
11
value 0.02476
scoring_system epss
scoring_elements 0.85302
published_at 2026-04-18T12:55:00Z
12
value 0.02476
scoring_system epss
scoring_elements 0.85299
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0159
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=566047
reference_id 566047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=566047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159
reference_id CVE-2010-0159
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-01
reference_id mfsa2010-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-01
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/895-1/
reference_id USN-895-1
reference_type
scores
url https://usn.ubuntu.com/895-1/
11
reference_url https://usn.ubuntu.com/896-1/
reference_id USN-896-1
reference_type
scores
url https://usn.ubuntu.com/896-1/
fixed_packages
aliases CVE-2010-0159
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89ja-f5vc-83d3
1
url VCID-8kzv-qk9n-9ydf
vulnerability_id VCID-8kzv-qk9n-9ydf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1571.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1571.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1571
reference_id
reference_type
scores
0
value 0.07108
scoring_system epss
scoring_elements 0.91561
published_at 2026-04-24T12:55:00Z
1
value 0.07108
scoring_system epss
scoring_elements 0.91491
published_at 2026-04-01T12:55:00Z
2
value 0.07108
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-02T12:55:00Z
3
value 0.07108
scoring_system epss
scoring_elements 0.91504
published_at 2026-04-04T12:55:00Z
4
value 0.07108
scoring_system epss
scoring_elements 0.91512
published_at 2026-04-07T12:55:00Z
5
value 0.07108
scoring_system epss
scoring_elements 0.91525
published_at 2026-04-08T12:55:00Z
6
value 0.07108
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-09T12:55:00Z
7
value 0.07108
scoring_system epss
scoring_elements 0.91536
published_at 2026-04-11T12:55:00Z
8
value 0.07108
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-12T12:55:00Z
9
value 0.07108
scoring_system epss
scoring_elements 0.91535
published_at 2026-04-13T12:55:00Z
10
value 0.07108
scoring_system epss
scoring_elements 0.91558
published_at 2026-04-16T12:55:00Z
11
value 0.07108
scoring_system epss
scoring_elements 0.91553
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1571
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=566050
reference_id 566050
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=566050
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571
reference_id CVE-2009-1571
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-03
reference_id mfsa2010-03
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-03
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/895-1/
reference_id USN-895-1
reference_type
scores
url https://usn.ubuntu.com/895-1/
11
reference_url https://usn.ubuntu.com/896-1/
reference_id USN-896-1
reference_type
scores
url https://usn.ubuntu.com/896-1/
fixed_packages
aliases CVE-2009-1571
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kzv-qk9n-9ydf
2
url VCID-usb1-ure3-77ft
vulnerability_id VCID-usb1-ure3-77ft
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0171
reference_id
reference_type
scores
0
value 0.00521
scoring_system epss
scoring_elements 0.66898
published_at 2026-04-24T12:55:00Z
1
value 0.00521
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-01T12:55:00Z
2
value 0.00521
scoring_system epss
scoring_elements 0.66809
published_at 2026-04-02T12:55:00Z
3
value 0.00521
scoring_system epss
scoring_elements 0.66834
published_at 2026-04-04T12:55:00Z
4
value 0.00521
scoring_system epss
scoring_elements 0.66807
published_at 2026-04-07T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66856
published_at 2026-04-08T12:55:00Z
6
value 0.00521
scoring_system epss
scoring_elements 0.66869
published_at 2026-04-09T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-11T12:55:00Z
8
value 0.00521
scoring_system epss
scoring_elements 0.66875
published_at 2026-04-12T12:55:00Z
9
value 0.00521
scoring_system epss
scoring_elements 0.66843
published_at 2026-04-13T12:55:00Z
10
value 0.00521
scoring_system epss
scoring_elements 0.66876
published_at 2026-04-16T12:55:00Z
11
value 0.00521
scoring_system epss
scoring_elements 0.6689
published_at 2026-04-18T12:55:00Z
12
value 0.00521
scoring_system epss
scoring_elements 0.66873
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0171
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=576696
reference_id 576696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=576696
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171
reference_id CVE-2010-0171
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-12
reference_id mfsa2010-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-12
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2010-0171
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-usb1-ure3-77ft
3
url VCID-y1cq-jzte-p3hq
vulnerability_id VCID-y1cq-jzte-p3hq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0169
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62227
published_at 2026-04-24T12:55:00Z
1
value 0.00424
scoring_system epss
scoring_elements 0.62067
published_at 2026-04-01T12:55:00Z
2
value 0.00424
scoring_system epss
scoring_elements 0.62127
published_at 2026-04-07T12:55:00Z
3
value 0.00424
scoring_system epss
scoring_elements 0.62159
published_at 2026-04-04T12:55:00Z
4
value 0.00424
scoring_system epss
scoring_elements 0.62177
published_at 2026-04-08T12:55:00Z
5
value 0.00424
scoring_system epss
scoring_elements 0.62195
published_at 2026-04-09T12:55:00Z
6
value 0.00424
scoring_system epss
scoring_elements 0.62212
published_at 2026-04-11T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62202
published_at 2026-04-12T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62182
published_at 2026-04-13T12:55:00Z
9
value 0.00424
scoring_system epss
scoring_elements 0.62225
published_at 2026-04-16T12:55:00Z
10
value 0.00424
scoring_system epss
scoring_elements 0.62232
published_at 2026-04-18T12:55:00Z
11
value 0.00424
scoring_system epss
scoring_elements 0.62216
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0169
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=576694
reference_id 576694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=576694
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169
reference_id CVE-2010-0169
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-14
reference_id mfsa2010-14
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-14
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2010-0169
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1cq-jzte-p3hq
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.50%3Farch=el3