Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@2.0.0.24-2?arch=el5_4
Typerpm
Namespaceredhat
Namethunderbird
Version2.0.0.24-2
Qualifiers
arch el5_4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-16d6-e24t-dfb7
vulnerability_id VCID-16d6-e24t-dfb7
summary Firefox integer underflow in FTP directory list parser
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3384.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3384
reference_id
reference_type
scores
0
value 0.01257
scoring_system epss
scoring_elements 0.7934
published_at 2026-04-01T12:55:00Z
1
value 0.01257
scoring_system epss
scoring_elements 0.79347
published_at 2026-04-02T12:55:00Z
2
value 0.01257
scoring_system epss
scoring_elements 0.7937
published_at 2026-04-04T12:55:00Z
3
value 0.01257
scoring_system epss
scoring_elements 0.79356
published_at 2026-04-07T12:55:00Z
4
value 0.01257
scoring_system epss
scoring_elements 0.79382
published_at 2026-04-08T12:55:00Z
5
value 0.01257
scoring_system epss
scoring_elements 0.79391
published_at 2026-04-09T12:55:00Z
6
value 0.01257
scoring_system epss
scoring_elements 0.79414
published_at 2026-04-11T12:55:00Z
7
value 0.01257
scoring_system epss
scoring_elements 0.79399
published_at 2026-04-12T12:55:00Z
8
value 0.01257
scoring_system epss
scoring_elements 0.79387
published_at 2026-04-13T12:55:00Z
9
value 0.01257
scoring_system epss
scoring_elements 0.79419
published_at 2026-04-16T12:55:00Z
10
value 0.01257
scoring_system epss
scoring_elements 0.79417
published_at 2026-04-18T12:55:00Z
11
value 0.01257
scoring_system epss
scoring_elements 0.7942
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3384
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530164
reference_id 530164
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530164
3
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
4
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
5
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
6
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2009-3384
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16d6-e24t-dfb7
1
url VCID-1n9c-e6em-kbb6
vulnerability_id VCID-1n9c-e6em-kbb6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3077
reference_id
reference_type
scores
0
value 0.0543
scoring_system epss
scoring_elements 0.90181
published_at 2026-04-21T12:55:00Z
1
value 0.0543
scoring_system epss
scoring_elements 0.90124
published_at 2026-04-01T12:55:00Z
2
value 0.0543
scoring_system epss
scoring_elements 0.90127
published_at 2026-04-02T12:55:00Z
3
value 0.0543
scoring_system epss
scoring_elements 0.90139
published_at 2026-04-04T12:55:00Z
4
value 0.0543
scoring_system epss
scoring_elements 0.90143
published_at 2026-04-07T12:55:00Z
5
value 0.0543
scoring_system epss
scoring_elements 0.90159
published_at 2026-04-08T12:55:00Z
6
value 0.0543
scoring_system epss
scoring_elements 0.90165
published_at 2026-04-09T12:55:00Z
7
value 0.0543
scoring_system epss
scoring_elements 0.90173
published_at 2026-04-12T12:55:00Z
8
value 0.0543
scoring_system epss
scoring_elements 0.90167
published_at 2026-04-13T12:55:00Z
9
value 0.0543
scoring_system epss
scoring_elements 0.90185
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3077
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521693
reference_id 521693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521693
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077
reference_id CVE-2009-3077
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-49
reference_id mfsa2009-49
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-49
6
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
7
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
8
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
9
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
10
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
11
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
12
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3077
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1n9c-e6em-kbb6
2
url VCID-2jhf-j64s-gygy
vulnerability_id VCID-2jhf-j64s-gygy
summary
Security researcher Alin Rad Pop of Secunia
Research reported a heap-based buffer overflow in Mozilla's string to
floating point number conversion routines.  Using this vulnerability
an attacker could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number which
would result in improper memory allocation and the execution of an
arbitrary memory location.  This vulnerability could thus be leveraged
by the attacker to run arbitrary code on a victim's computer.Update: The underlying flaw in the dtoa routines used
by Mozilla appears to be essentially the same as that reported against the
libc gdtoa routine by Maksymilian Arciemowicz.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
reference_id
reference_type
scores
0
value 0.4176
scoring_system epss
scoring_elements 0.97433
published_at 2026-04-21T12:55:00Z
1
value 0.4176
scoring_system epss
scoring_elements 0.97395
published_at 2026-04-01T12:55:00Z
2
value 0.4176
scoring_system epss
scoring_elements 0.97421
published_at 2026-04-13T12:55:00Z
3
value 0.4176
scoring_system epss
scoring_elements 0.97429
published_at 2026-04-16T12:55:00Z
4
value 0.4176
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-02T12:55:00Z
5
value 0.4176
scoring_system epss
scoring_elements 0.97406
published_at 2026-04-04T12:55:00Z
6
value 0.4176
scoring_system epss
scoring_elements 0.97408
published_at 2026-04-07T12:55:00Z
7
value 0.4176
scoring_system epss
scoring_elements 0.97415
published_at 2026-04-08T12:55:00Z
8
value 0.4176
scoring_system epss
scoring_elements 0.97417
published_at 2026-04-09T12:55:00Z
9
value 0.4176
scoring_system epss
scoring_elements 0.97419
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=539784
reference_id 539784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=539784
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
reference_id CVE-2009-0689
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
reference_id CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
8
reference_url https://www.securityfocus.com/bid/37078/info
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://www.securityfocus.com/bid/37078/info
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
11
reference_url https://www.securityfocus.com/bid/37080/info
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://www.securityfocus.com/bid/37080/info
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
13
reference_url https://www.securityfocus.com/bid/36851/info
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://www.securityfocus.com/bid/36851/info
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
reference_id CVE-2009-0689;OSVDB-62402
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
17
reference_url https://www.securityfocus.com/bid/35510/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/35510/info
18
reference_url https://www.securityfocus.com/bid/37687/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/37687/info
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
20
reference_url https://www.securityfocus.com/bid/37688/info
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://www.securityfocus.com/bid/37688/info
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
reference_id mfsa2009-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
reference_id OSVDB-61189;CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
23
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
24
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
25
reference_url https://access.redhat.com/errata/RHSA-2009:1601
reference_id RHSA-2009:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1601
26
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
27
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
28
reference_url https://access.redhat.com/errata/RHSA-2014:0311
reference_id RHSA-2014:0311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0311
29
reference_url https://access.redhat.com/errata/RHSA-2014:0312
reference_id RHSA-2014:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0312
30
reference_url https://usn.ubuntu.com/871-1/
reference_id USN-871-1
reference_type
scores
url https://usn.ubuntu.com/871-1/
31
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-0689
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jhf-j64s-gygy
3
url VCID-3bf4-ms9e-x3dq
vulnerability_id VCID-3bf4-ms9e-x3dq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3076
reference_id
reference_type
scores
0
value 0.17599
scoring_system epss
scoring_elements 0.95108
published_at 2026-04-21T12:55:00Z
1
value 0.17599
scoring_system epss
scoring_elements 0.95059
published_at 2026-04-01T12:55:00Z
2
value 0.17599
scoring_system epss
scoring_elements 0.95069
published_at 2026-04-02T12:55:00Z
3
value 0.17599
scoring_system epss
scoring_elements 0.9507
published_at 2026-04-04T12:55:00Z
4
value 0.17599
scoring_system epss
scoring_elements 0.95072
published_at 2026-04-07T12:55:00Z
5
value 0.17599
scoring_system epss
scoring_elements 0.95079
published_at 2026-04-08T12:55:00Z
6
value 0.17599
scoring_system epss
scoring_elements 0.95083
published_at 2026-04-09T12:55:00Z
7
value 0.17599
scoring_system epss
scoring_elements 0.95089
published_at 2026-04-11T12:55:00Z
8
value 0.17599
scoring_system epss
scoring_elements 0.9509
published_at 2026-04-12T12:55:00Z
9
value 0.17599
scoring_system epss
scoring_elements 0.95093
published_at 2026-04-13T12:55:00Z
10
value 0.17599
scoring_system epss
scoring_elements 0.95102
published_at 2026-04-16T12:55:00Z
11
value 0.17599
scoring_system epss
scoring_elements 0.95105
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3076
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521692
reference_id 521692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521692
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076
reference_id CVE-2009-3076
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt
reference_id CVE-2009-3076;OSVDB-57977
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-48
reference_id mfsa2009-48
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-48
7
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
8
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
9
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
10
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
11
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
12
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
fixed_packages
aliases CVE-2009-3076
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bf4-ms9e-x3dq
4
url VCID-53kn-ev4f-dufh
vulnerability_id VCID-53kn-ev4f-dufh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2463.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2463
reference_id
reference_type
scores
0
value 0.0522
scoring_system epss
scoring_elements 0.89958
published_at 2026-04-21T12:55:00Z
1
value 0.0522
scoring_system epss
scoring_elements 0.89961
published_at 2026-04-16T12:55:00Z
2
value 0.0522
scoring_system epss
scoring_elements 0.89963
published_at 2026-04-18T12:55:00Z
3
value 0.0522
scoring_system epss
scoring_elements 0.89905
published_at 2026-04-01T12:55:00Z
4
value 0.0522
scoring_system epss
scoring_elements 0.89909
published_at 2026-04-02T12:55:00Z
5
value 0.0522
scoring_system epss
scoring_elements 0.89921
published_at 2026-04-04T12:55:00Z
6
value 0.0522
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-07T12:55:00Z
7
value 0.0522
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-08T12:55:00Z
8
value 0.0522
scoring_system epss
scoring_elements 0.89949
published_at 2026-04-09T12:55:00Z
9
value 0.0522
scoring_system epss
scoring_elements 0.89957
published_at 2026-04-11T12:55:00Z
10
value 0.0522
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-12T12:55:00Z
11
value 0.0522
scoring_system epss
scoring_elements 0.89948
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2463
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512131
reference_id 512131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463
reference_id CVE-2009-2463
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
reference_id mfsa2009-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
7
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
8
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
9
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
10
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
11
reference_url https://usn.ubuntu.com/798-1/
reference_id USN-798-1
reference_type
scores
url https://usn.ubuntu.com/798-1/
12
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-2463
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53kn-ev4f-dufh
5
url VCID-5bdt-dd2k-c7gq
vulnerability_id VCID-5bdt-dd2k-c7gq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3376.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3376
reference_id
reference_type
scores
0
value 0.03024
scoring_system epss
scoring_elements 0.86637
published_at 2026-04-21T12:55:00Z
1
value 0.03024
scoring_system epss
scoring_elements 0.86561
published_at 2026-04-01T12:55:00Z
2
value 0.03024
scoring_system epss
scoring_elements 0.86572
published_at 2026-04-02T12:55:00Z
3
value 0.03024
scoring_system epss
scoring_elements 0.86591
published_at 2026-04-07T12:55:00Z
4
value 0.03024
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-08T12:55:00Z
5
value 0.03024
scoring_system epss
scoring_elements 0.8662
published_at 2026-04-09T12:55:00Z
6
value 0.03024
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-11T12:55:00Z
7
value 0.03024
scoring_system epss
scoring_elements 0.86632
published_at 2026-04-12T12:55:00Z
8
value 0.03024
scoring_system epss
scoring_elements 0.86625
published_at 2026-04-13T12:55:00Z
9
value 0.03024
scoring_system epss
scoring_elements 0.86638
published_at 2026-04-16T12:55:00Z
10
value 0.03024
scoring_system epss
scoring_elements 0.86644
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3376
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530168
reference_id 530168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530168
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376
reference_id CVE-2009-3376
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-62
reference_id mfsa2009-62
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-62
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
11
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3376
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5bdt-dd2k-c7gq
6
url VCID-85v1-yb4g-bqa4
vulnerability_id VCID-85v1-yb4g-bqa4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0163.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0163.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0163
reference_id
reference_type
scores
0
value 0.05442
scoring_system epss
scoring_elements 0.90191
published_at 2026-04-21T12:55:00Z
1
value 0.05442
scoring_system epss
scoring_elements 0.90134
published_at 2026-04-01T12:55:00Z
2
value 0.05442
scoring_system epss
scoring_elements 0.90137
published_at 2026-04-02T12:55:00Z
3
value 0.05442
scoring_system epss
scoring_elements 0.90148
published_at 2026-04-04T12:55:00Z
4
value 0.05442
scoring_system epss
scoring_elements 0.90153
published_at 2026-04-07T12:55:00Z
5
value 0.05442
scoring_system epss
scoring_elements 0.90169
published_at 2026-04-08T12:55:00Z
6
value 0.05442
scoring_system epss
scoring_elements 0.90174
published_at 2026-04-09T12:55:00Z
7
value 0.05442
scoring_system epss
scoring_elements 0.90183
published_at 2026-04-11T12:55:00Z
8
value 0.05442
scoring_system epss
scoring_elements 0.90182
published_at 2026-04-12T12:55:00Z
9
value 0.05442
scoring_system epss
scoring_elements 0.90177
published_at 2026-04-13T12:55:00Z
10
value 0.05442
scoring_system epss
scoring_elements 0.90195
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0163
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=576391
reference_id 576391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=576391
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0163
reference_id CVE-2010-0163
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0163
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
6
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
7
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
8
reference_url https://access.redhat.com/errata/RHSA-2010:0499
reference_id RHSA-2010:0499
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0499
9
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2010-0163
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85v1-yb4g-bqa4
7
url VCID-89ja-f5vc-83d3
vulnerability_id VCID-89ja-f5vc-83d3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0159.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0159.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0159
reference_id
reference_type
scores
0
value 0.02476
scoring_system epss
scoring_elements 0.85299
published_at 2026-04-21T12:55:00Z
1
value 0.02476
scoring_system epss
scoring_elements 0.85209
published_at 2026-04-01T12:55:00Z
2
value 0.02476
scoring_system epss
scoring_elements 0.8522
published_at 2026-04-02T12:55:00Z
3
value 0.02476
scoring_system epss
scoring_elements 0.85239
published_at 2026-04-04T12:55:00Z
4
value 0.02476
scoring_system epss
scoring_elements 0.85241
published_at 2026-04-07T12:55:00Z
5
value 0.02476
scoring_system epss
scoring_elements 0.85263
published_at 2026-04-08T12:55:00Z
6
value 0.02476
scoring_system epss
scoring_elements 0.85271
published_at 2026-04-09T12:55:00Z
7
value 0.02476
scoring_system epss
scoring_elements 0.85285
published_at 2026-04-11T12:55:00Z
8
value 0.02476
scoring_system epss
scoring_elements 0.85283
published_at 2026-04-12T12:55:00Z
9
value 0.02476
scoring_system epss
scoring_elements 0.8528
published_at 2026-04-13T12:55:00Z
10
value 0.02476
scoring_system epss
scoring_elements 0.85301
published_at 2026-04-16T12:55:00Z
11
value 0.02476
scoring_system epss
scoring_elements 0.85302
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0159
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=566047
reference_id 566047
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=566047
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159
reference_id CVE-2010-0159
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-01
reference_id mfsa2010-01
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-01
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/895-1/
reference_id USN-895-1
reference_type
scores
url https://usn.ubuntu.com/895-1/
11
reference_url https://usn.ubuntu.com/896-1/
reference_id USN-896-1
reference_type
scores
url https://usn.ubuntu.com/896-1/
fixed_packages
aliases CVE-2010-0159
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-89ja-f5vc-83d3
8
url VCID-8kzv-qk9n-9ydf
vulnerability_id VCID-8kzv-qk9n-9ydf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1571.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1571.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1571
reference_id
reference_type
scores
0
value 0.07108
scoring_system epss
scoring_elements 0.91553
published_at 2026-04-21T12:55:00Z
1
value 0.07108
scoring_system epss
scoring_elements 0.91491
published_at 2026-04-01T12:55:00Z
2
value 0.07108
scoring_system epss
scoring_elements 0.91498
published_at 2026-04-02T12:55:00Z
3
value 0.07108
scoring_system epss
scoring_elements 0.91504
published_at 2026-04-04T12:55:00Z
4
value 0.07108
scoring_system epss
scoring_elements 0.91512
published_at 2026-04-07T12:55:00Z
5
value 0.07108
scoring_system epss
scoring_elements 0.91525
published_at 2026-04-08T12:55:00Z
6
value 0.07108
scoring_system epss
scoring_elements 0.91531
published_at 2026-04-09T12:55:00Z
7
value 0.07108
scoring_system epss
scoring_elements 0.91536
published_at 2026-04-11T12:55:00Z
8
value 0.07108
scoring_system epss
scoring_elements 0.91538
published_at 2026-04-12T12:55:00Z
9
value 0.07108
scoring_system epss
scoring_elements 0.91535
published_at 2026-04-13T12:55:00Z
10
value 0.07108
scoring_system epss
scoring_elements 0.91558
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1571
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=566050
reference_id 566050
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=566050
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571
reference_id CVE-2009-1571
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-03
reference_id mfsa2010-03
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-03
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/895-1/
reference_id USN-895-1
reference_type
scores
url https://usn.ubuntu.com/895-1/
11
reference_url https://usn.ubuntu.com/896-1/
reference_id USN-896-1
reference_type
scores
url https://usn.ubuntu.com/896-1/
fixed_packages
aliases CVE-2009-1571
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kzv-qk9n-9ydf
9
url VCID-9jkh-xn2d-3bdx
vulnerability_id VCID-9jkh-xn2d-3bdx
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3979.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3979.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3979
reference_id
reference_type
scores
0
value 0.05076
scoring_system epss
scoring_elements 0.89814
published_at 2026-04-18T12:55:00Z
1
value 0.05076
scoring_system epss
scoring_elements 0.89757
published_at 2026-04-01T12:55:00Z
2
value 0.05076
scoring_system epss
scoring_elements 0.8976
published_at 2026-04-02T12:55:00Z
3
value 0.05076
scoring_system epss
scoring_elements 0.89775
published_at 2026-04-04T12:55:00Z
4
value 0.05076
scoring_system epss
scoring_elements 0.89778
published_at 2026-04-07T12:55:00Z
5
value 0.05076
scoring_system epss
scoring_elements 0.89796
published_at 2026-04-08T12:55:00Z
6
value 0.05076
scoring_system epss
scoring_elements 0.89802
published_at 2026-04-09T12:55:00Z
7
value 0.05076
scoring_system epss
scoring_elements 0.89808
published_at 2026-04-21T12:55:00Z
8
value 0.05076
scoring_system epss
scoring_elements 0.89806
published_at 2026-04-12T12:55:00Z
9
value 0.05076
scoring_system epss
scoring_elements 0.89799
published_at 2026-04-13T12:55:00Z
10
value 0.05076
scoring_system epss
scoring_elements 0.89813
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3979
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=546694
reference_id 546694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=546694
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979
reference_id CVE-2009-3979
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-65
reference_id mfsa2009-65
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-65
6
reference_url https://access.redhat.com/errata/RHSA-2009:1673
reference_id RHSA-2009:1673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1673
7
reference_url https://access.redhat.com/errata/RHSA-2009:1674
reference_id RHSA-2009:1674
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1674
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/873-1/
reference_id USN-873-1
reference_type
scores
url https://usn.ubuntu.com/873-1/
11
reference_url https://usn.ubuntu.com/874-1/
reference_id USN-874-1
reference_type
scores
url https://usn.ubuntu.com/874-1/
fixed_packages
aliases CVE-2009-3979
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jkh-xn2d-3bdx
10
url VCID-b76x-3z8j-4fa9
vulnerability_id VCID-b76x-3z8j-4fa9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3274.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3274
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.341
published_at 2026-04-21T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.33873
published_at 2026-04-01T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34211
published_at 2026-04-02T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34244
published_at 2026-04-04T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34106
published_at 2026-04-07T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34149
published_at 2026-04-08T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34178
published_at 2026-04-11T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34135
published_at 2026-04-18T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34111
published_at 2026-04-13T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.34148
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3274
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=524815
reference_id 524815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=524815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274
reference_id CVE-2009-3274
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-53
reference_id mfsa2009-53
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-53
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3274
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b76x-3z8j-4fa9
11
url VCID-cwsk-1qr2-1fed
vulnerability_id VCID-cwsk-1qr2-1fed
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2466.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2466
reference_id
reference_type
scores
0
value 0.05821
scoring_system epss
scoring_elements 0.90542
published_at 2026-04-21T12:55:00Z
1
value 0.05821
scoring_system epss
scoring_elements 0.90486
published_at 2026-04-01T12:55:00Z
2
value 0.05821
scoring_system epss
scoring_elements 0.9049
published_at 2026-04-02T12:55:00Z
3
value 0.05821
scoring_system epss
scoring_elements 0.905
published_at 2026-04-04T12:55:00Z
4
value 0.05821
scoring_system epss
scoring_elements 0.90506
published_at 2026-04-07T12:55:00Z
5
value 0.05821
scoring_system epss
scoring_elements 0.90518
published_at 2026-04-08T12:55:00Z
6
value 0.05821
scoring_system epss
scoring_elements 0.90525
published_at 2026-04-09T12:55:00Z
7
value 0.05821
scoring_system epss
scoring_elements 0.90533
published_at 2026-04-12T12:55:00Z
8
value 0.05821
scoring_system epss
scoring_elements 0.90526
published_at 2026-04-13T12:55:00Z
9
value 0.05821
scoring_system epss
scoring_elements 0.90544
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2466
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512136
reference_id 512136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512136
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2466
reference_id CVE-2009-2466
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2466
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
reference_id mfsa2009-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
6
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
7
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/798-1/
reference_id USN-798-1
reference_type
scores
url https://usn.ubuntu.com/798-1/
fixed_packages
aliases CVE-2009-2466
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwsk-1qr2-1fed
12
url VCID-jwsm-57gb-jkb4
vulnerability_id VCID-jwsm-57gb-jkb4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3075
reference_id
reference_type
scores
0
value 0.06395
scoring_system epss
scoring_elements 0.91052
published_at 2026-04-21T12:55:00Z
1
value 0.06395
scoring_system epss
scoring_elements 0.91051
published_at 2026-04-16T12:55:00Z
2
value 0.06395
scoring_system epss
scoring_elements 0.9105
published_at 2026-04-18T12:55:00Z
3
value 0.06395
scoring_system epss
scoring_elements 0.90976
published_at 2026-04-01T12:55:00Z
4
value 0.06395
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-02T12:55:00Z
5
value 0.06395
scoring_system epss
scoring_elements 0.9099
published_at 2026-04-04T12:55:00Z
6
value 0.06395
scoring_system epss
scoring_elements 0.91001
published_at 2026-04-07T12:55:00Z
7
value 0.06395
scoring_system epss
scoring_elements 0.91013
published_at 2026-04-08T12:55:00Z
8
value 0.06395
scoring_system epss
scoring_elements 0.91018
published_at 2026-04-09T12:55:00Z
9
value 0.06395
scoring_system epss
scoring_elements 0.91027
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3075
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521691
reference_id 521691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521691
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075
reference_id CVE-2009-3075
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
reference_id mfsa2009-47
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
7
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
8
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
9
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
10
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
11
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
12
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
13
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3075
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwsm-57gb-jkb4
13
url VCID-sapd-n7mr-eudc
vulnerability_id VCID-sapd-n7mr-eudc
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2470.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2470
reference_id
reference_type
scores
0
value 0.0266
scoring_system epss
scoring_elements 0.85803
published_at 2026-04-21T12:55:00Z
1
value 0.0266
scoring_system epss
scoring_elements 0.85713
published_at 2026-04-01T12:55:00Z
2
value 0.0266
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-02T12:55:00Z
3
value 0.0266
scoring_system epss
scoring_elements 0.85744
published_at 2026-04-04T12:55:00Z
4
value 0.0266
scoring_system epss
scoring_elements 0.8575
published_at 2026-04-07T12:55:00Z
5
value 0.0266
scoring_system epss
scoring_elements 0.85769
published_at 2026-04-08T12:55:00Z
6
value 0.0266
scoring_system epss
scoring_elements 0.85779
published_at 2026-04-09T12:55:00Z
7
value 0.0266
scoring_system epss
scoring_elements 0.85794
published_at 2026-04-11T12:55:00Z
8
value 0.0266
scoring_system epss
scoring_elements 0.85791
published_at 2026-04-12T12:55:00Z
9
value 0.0266
scoring_system epss
scoring_elements 0.85787
published_at 2026-04-13T12:55:00Z
10
value 0.0266
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-16T12:55:00Z
11
value 0.0266
scoring_system epss
scoring_elements 0.8581
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2470
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512145
reference_id 512145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512145
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470
reference_id CVE-2009-2470
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-38
reference_id mfsa2009-38
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-38
6
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
7
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2009-2470
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sapd-n7mr-eudc
14
url VCID-usb1-ure3-77ft
vulnerability_id VCID-usb1-ure3-77ft
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0171
reference_id
reference_type
scores
0
value 0.00521
scoring_system epss
scoring_elements 0.66873
published_at 2026-04-21T12:55:00Z
1
value 0.00521
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-01T12:55:00Z
2
value 0.00521
scoring_system epss
scoring_elements 0.66809
published_at 2026-04-02T12:55:00Z
3
value 0.00521
scoring_system epss
scoring_elements 0.66834
published_at 2026-04-04T12:55:00Z
4
value 0.00521
scoring_system epss
scoring_elements 0.66807
published_at 2026-04-07T12:55:00Z
5
value 0.00521
scoring_system epss
scoring_elements 0.66856
published_at 2026-04-08T12:55:00Z
6
value 0.00521
scoring_system epss
scoring_elements 0.66869
published_at 2026-04-09T12:55:00Z
7
value 0.00521
scoring_system epss
scoring_elements 0.66889
published_at 2026-04-11T12:55:00Z
8
value 0.00521
scoring_system epss
scoring_elements 0.66875
published_at 2026-04-12T12:55:00Z
9
value 0.00521
scoring_system epss
scoring_elements 0.66843
published_at 2026-04-13T12:55:00Z
10
value 0.00521
scoring_system epss
scoring_elements 0.66876
published_at 2026-04-16T12:55:00Z
11
value 0.00521
scoring_system epss
scoring_elements 0.6689
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0171
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=576696
reference_id 576696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=576696
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171
reference_id CVE-2010-0171
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-12
reference_id mfsa2010-12
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-12
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2010-0171
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-usb1-ure3-77ft
15
url VCID-v7mb-nqbm-93bs
vulnerability_id VCID-v7mb-nqbm-93bs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2462.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2462
reference_id
reference_type
scores
0
value 0.0345
scoring_system epss
scoring_elements 0.87529
published_at 2026-04-18T12:55:00Z
1
value 0.0345
scoring_system epss
scoring_elements 0.87458
published_at 2026-04-01T12:55:00Z
2
value 0.0345
scoring_system epss
scoring_elements 0.87468
published_at 2026-04-02T12:55:00Z
3
value 0.0345
scoring_system epss
scoring_elements 0.87481
published_at 2026-04-04T12:55:00Z
4
value 0.0345
scoring_system epss
scoring_elements 0.87483
published_at 2026-04-07T12:55:00Z
5
value 0.0345
scoring_system epss
scoring_elements 0.87503
published_at 2026-04-08T12:55:00Z
6
value 0.0345
scoring_system epss
scoring_elements 0.87509
published_at 2026-04-09T12:55:00Z
7
value 0.0345
scoring_system epss
scoring_elements 0.87521
published_at 2026-04-11T12:55:00Z
8
value 0.0345
scoring_system epss
scoring_elements 0.87516
published_at 2026-04-12T12:55:00Z
9
value 0.0345
scoring_system epss
scoring_elements 0.87513
published_at 2026-04-13T12:55:00Z
10
value 0.0345
scoring_system epss
scoring_elements 0.87527
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2462
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512128
reference_id 512128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512128
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462
reference_id CVE-2009-2462
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
reference_id mfsa2009-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
6
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
7
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/798-1/
reference_id USN-798-1
reference_type
scores
url https://usn.ubuntu.com/798-1/
fixed_packages
aliases CVE-2009-2462
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7mb-nqbm-93bs
16
url VCID-wqza-9p8v-4kek
vulnerability_id VCID-wqza-9p8v-4kek
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3072
reference_id
reference_type
scores
0
value 0.04749
scoring_system epss
scoring_elements 0.89445
published_at 2026-04-21T12:55:00Z
1
value 0.04749
scoring_system epss
scoring_elements 0.89447
published_at 2026-04-16T12:55:00Z
2
value 0.04749
scoring_system epss
scoring_elements 0.89448
published_at 2026-04-18T12:55:00Z
3
value 0.04749
scoring_system epss
scoring_elements 0.89392
published_at 2026-04-01T12:55:00Z
4
value 0.04749
scoring_system epss
scoring_elements 0.89396
published_at 2026-04-02T12:55:00Z
5
value 0.04749
scoring_system epss
scoring_elements 0.89406
published_at 2026-04-04T12:55:00Z
6
value 0.04749
scoring_system epss
scoring_elements 0.89408
published_at 2026-04-07T12:55:00Z
7
value 0.04749
scoring_system epss
scoring_elements 0.89425
published_at 2026-04-08T12:55:00Z
8
value 0.04749
scoring_system epss
scoring_elements 0.89429
published_at 2026-04-09T12:55:00Z
9
value 0.04749
scoring_system epss
scoring_elements 0.89438
published_at 2026-04-11T12:55:00Z
10
value 0.04749
scoring_system epss
scoring_elements 0.89436
published_at 2026-04-12T12:55:00Z
11
value 0.04749
scoring_system epss
scoring_elements 0.89431
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3072
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521688
reference_id 521688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072
reference_id CVE-2009-3072
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
reference_id mfsa2009-47
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
7
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
8
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
9
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
10
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
11
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
12
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
13
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3072
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqza-9p8v-4kek
17
url VCID-y1cq-jzte-p3hq
vulnerability_id VCID-y1cq-jzte-p3hq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0169
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62216
published_at 2026-04-21T12:55:00Z
1
value 0.00424
scoring_system epss
scoring_elements 0.62067
published_at 2026-04-01T12:55:00Z
2
value 0.00424
scoring_system epss
scoring_elements 0.62127
published_at 2026-04-07T12:55:00Z
3
value 0.00424
scoring_system epss
scoring_elements 0.62159
published_at 2026-04-04T12:55:00Z
4
value 0.00424
scoring_system epss
scoring_elements 0.62177
published_at 2026-04-08T12:55:00Z
5
value 0.00424
scoring_system epss
scoring_elements 0.62195
published_at 2026-04-09T12:55:00Z
6
value 0.00424
scoring_system epss
scoring_elements 0.62212
published_at 2026-04-11T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62202
published_at 2026-04-12T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62182
published_at 2026-04-13T12:55:00Z
9
value 0.00424
scoring_system epss
scoring_elements 0.62225
published_at 2026-04-16T12:55:00Z
10
value 0.00424
scoring_system epss
scoring_elements 0.62232
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0169
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=576694
reference_id 576694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=576694
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169
reference_id CVE-2010-0169
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-14
reference_id mfsa2010-14
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-14
6
reference_url https://access.redhat.com/errata/RHSA-2010:0112
reference_id RHSA-2010:0112
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0112
7
reference_url https://access.redhat.com/errata/RHSA-2010:0113
reference_id RHSA-2010:0113
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0113
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2010-0169
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1cq-jzte-p3hq
18
url VCID-yn4z-ymst-1bew
vulnerability_id VCID-yn4z-ymst-1bew
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3380.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3380
reference_id
reference_type
scores
0
value 0.0364
scoring_system epss
scoring_elements 0.87862
published_at 2026-04-21T12:55:00Z
1
value 0.0364
scoring_system epss
scoring_elements 0.87795
published_at 2026-04-01T12:55:00Z
2
value 0.0364
scoring_system epss
scoring_elements 0.87806
published_at 2026-04-02T12:55:00Z
3
value 0.0364
scoring_system epss
scoring_elements 0.87817
published_at 2026-04-04T12:55:00Z
4
value 0.0364
scoring_system epss
scoring_elements 0.8782
published_at 2026-04-07T12:55:00Z
5
value 0.0364
scoring_system epss
scoring_elements 0.87842
published_at 2026-04-08T12:55:00Z
6
value 0.0364
scoring_system epss
scoring_elements 0.87849
published_at 2026-04-09T12:55:00Z
7
value 0.0364
scoring_system epss
scoring_elements 0.8786
published_at 2026-04-11T12:55:00Z
8
value 0.0364
scoring_system epss
scoring_elements 0.87854
published_at 2026-04-12T12:55:00Z
9
value 0.0364
scoring_system epss
scoring_elements 0.87853
published_at 2026-04-13T12:55:00Z
10
value 0.0364
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-16T12:55:00Z
11
value 0.0364
scoring_system epss
scoring_elements 0.87865
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3380
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530567
reference_id 530567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530567
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380
reference_id CVE-2009-3380
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-64
reference_id mfsa2009-64
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-64
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3380
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yn4z-ymst-1bew
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@2.0.0.24-2%3Farch=el5_4