Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@3.0.15-3?arch=el5_4
Typerpm
Namespaceredhat
Namefirefox
Version3.0.15-3
Qualifiers
arch el5_4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-16d6-e24t-dfb7
vulnerability_id VCID-16d6-e24t-dfb7
summary Firefox integer underflow in FTP directory list parser
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3384.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3384
reference_id
reference_type
scores
0
value 0.01257
scoring_system epss
scoring_elements 0.7934
published_at 2026-04-01T12:55:00Z
1
value 0.01257
scoring_system epss
scoring_elements 0.79347
published_at 2026-04-02T12:55:00Z
2
value 0.01257
scoring_system epss
scoring_elements 0.7937
published_at 2026-04-04T12:55:00Z
3
value 0.01257
scoring_system epss
scoring_elements 0.79356
published_at 2026-04-07T12:55:00Z
4
value 0.01257
scoring_system epss
scoring_elements 0.79382
published_at 2026-04-08T12:55:00Z
5
value 0.01257
scoring_system epss
scoring_elements 0.79391
published_at 2026-04-09T12:55:00Z
6
value 0.01257
scoring_system epss
scoring_elements 0.79414
published_at 2026-04-11T12:55:00Z
7
value 0.01257
scoring_system epss
scoring_elements 0.79399
published_at 2026-04-12T12:55:00Z
8
value 0.01257
scoring_system epss
scoring_elements 0.79387
published_at 2026-04-13T12:55:00Z
9
value 0.01257
scoring_system epss
scoring_elements 0.79419
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3384
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530164
reference_id 530164
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530164
3
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
4
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
5
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
6
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2009-3384
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-16d6-e24t-dfb7
1
url VCID-2jhf-j64s-gygy
vulnerability_id VCID-2jhf-j64s-gygy
summary
Security researcher Alin Rad Pop of Secunia
Research reported a heap-based buffer overflow in Mozilla's string to
floating point number conversion routines.  Using this vulnerability
an attacker could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number which
would result in improper memory allocation and the execution of an
arbitrary memory location.  This vulnerability could thus be leveraged
by the attacker to run arbitrary code on a victim's computer.Update: The underlying flaw in the dtoa routines used
by Mozilla appears to be essentially the same as that reported against the
libc gdtoa routine by Maksymilian Arciemowicz.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
reference_id
reference_type
scores
0
value 0.4176
scoring_system epss
scoring_elements 0.97429
published_at 2026-04-16T12:55:00Z
1
value 0.4176
scoring_system epss
scoring_elements 0.97395
published_at 2026-04-01T12:55:00Z
2
value 0.4176
scoring_system epss
scoring_elements 0.97419
published_at 2026-04-11T12:55:00Z
3
value 0.4176
scoring_system epss
scoring_elements 0.97421
published_at 2026-04-13T12:55:00Z
4
value 0.4176
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-02T12:55:00Z
5
value 0.4176
scoring_system epss
scoring_elements 0.97406
published_at 2026-04-04T12:55:00Z
6
value 0.4176
scoring_system epss
scoring_elements 0.97408
published_at 2026-04-07T12:55:00Z
7
value 0.4176
scoring_system epss
scoring_elements 0.97415
published_at 2026-04-08T12:55:00Z
8
value 0.4176
scoring_system epss
scoring_elements 0.97417
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=539784
reference_id 539784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=539784
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
reference_id CVE-2009-0689
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
reference_id CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
8
reference_url https://www.securityfocus.com/bid/37078/info
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://www.securityfocus.com/bid/37078/info
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
11
reference_url https://www.securityfocus.com/bid/37080/info
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://www.securityfocus.com/bid/37080/info
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
13
reference_url https://www.securityfocus.com/bid/36851/info
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://www.securityfocus.com/bid/36851/info
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
reference_id CVE-2009-0689;OSVDB-62402
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
17
reference_url https://www.securityfocus.com/bid/35510/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/35510/info
18
reference_url https://www.securityfocus.com/bid/37687/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/37687/info
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
20
reference_url https://www.securityfocus.com/bid/37688/info
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://www.securityfocus.com/bid/37688/info
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
reference_id mfsa2009-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
reference_id OSVDB-61189;CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
23
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
24
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
25
reference_url https://access.redhat.com/errata/RHSA-2009:1601
reference_id RHSA-2009:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1601
26
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
27
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
28
reference_url https://access.redhat.com/errata/RHSA-2014:0311
reference_id RHSA-2014:0311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0311
29
reference_url https://access.redhat.com/errata/RHSA-2014:0312
reference_id RHSA-2014:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0312
30
reference_url https://usn.ubuntu.com/871-1/
reference_id USN-871-1
reference_type
scores
url https://usn.ubuntu.com/871-1/
31
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-0689
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jhf-j64s-gygy
2
url VCID-4vaj-81k4-n3a6
vulnerability_id VCID-4vaj-81k4-n3a6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3374.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3374.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3374
reference_id
reference_type
scores
0
value 0.00887
scoring_system epss
scoring_elements 0.75501
published_at 2026-04-16T12:55:00Z
1
value 0.00887
scoring_system epss
scoring_elements 0.75404
published_at 2026-04-01T12:55:00Z
2
value 0.00887
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-02T12:55:00Z
3
value 0.00887
scoring_system epss
scoring_elements 0.75439
published_at 2026-04-04T12:55:00Z
4
value 0.00887
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-07T12:55:00Z
5
value 0.00887
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-08T12:55:00Z
6
value 0.00887
scoring_system epss
scoring_elements 0.75472
published_at 2026-04-09T12:55:00Z
7
value 0.00887
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-11T12:55:00Z
8
value 0.00887
scoring_system epss
scoring_elements 0.7547
published_at 2026-04-12T12:55:00Z
9
value 0.00887
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3374
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530157
reference_id 530157
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530157
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374
reference_id CVE-2009-3374
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-57
reference_id mfsa2009-57
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-57
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3374
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vaj-81k4-n3a6
3
url VCID-58z4-jhs8-kyay
vulnerability_id VCID-58z4-jhs8-kyay
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3372.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3372
reference_id
reference_type
scores
0
value 0.0177
scoring_system epss
scoring_elements 0.82685
published_at 2026-04-16T12:55:00Z
1
value 0.0177
scoring_system epss
scoring_elements 0.8258
published_at 2026-04-01T12:55:00Z
2
value 0.0177
scoring_system epss
scoring_elements 0.82595
published_at 2026-04-02T12:55:00Z
3
value 0.0177
scoring_system epss
scoring_elements 0.82611
published_at 2026-04-04T12:55:00Z
4
value 0.0177
scoring_system epss
scoring_elements 0.82607
published_at 2026-04-07T12:55:00Z
5
value 0.0177
scoring_system epss
scoring_elements 0.82633
published_at 2026-04-08T12:55:00Z
6
value 0.0177
scoring_system epss
scoring_elements 0.8264
published_at 2026-04-09T12:55:00Z
7
value 0.0177
scoring_system epss
scoring_elements 0.82658
published_at 2026-04-11T12:55:00Z
8
value 0.0177
scoring_system epss
scoring_elements 0.82652
published_at 2026-04-12T12:55:00Z
9
value 0.0177
scoring_system epss
scoring_elements 0.82647
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3372
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530155
reference_id 530155
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530155
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372
reference_id CVE-2009-3372
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-55
reference_id mfsa2009-55
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-55
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3372
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58z4-jhs8-kyay
4
url VCID-5bdt-dd2k-c7gq
vulnerability_id VCID-5bdt-dd2k-c7gq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3376.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3376
reference_id
reference_type
scores
0
value 0.03024
scoring_system epss
scoring_elements 0.86638
published_at 2026-04-16T12:55:00Z
1
value 0.03024
scoring_system epss
scoring_elements 0.86561
published_at 2026-04-01T12:55:00Z
2
value 0.03024
scoring_system epss
scoring_elements 0.86572
published_at 2026-04-02T12:55:00Z
3
value 0.03024
scoring_system epss
scoring_elements 0.86591
published_at 2026-04-07T12:55:00Z
4
value 0.03024
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-08T12:55:00Z
5
value 0.03024
scoring_system epss
scoring_elements 0.8662
published_at 2026-04-09T12:55:00Z
6
value 0.03024
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-11T12:55:00Z
7
value 0.03024
scoring_system epss
scoring_elements 0.86632
published_at 2026-04-12T12:55:00Z
8
value 0.03024
scoring_system epss
scoring_elements 0.86625
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3376
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530168
reference_id 530168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530168
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376
reference_id CVE-2009-3376
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-62
reference_id mfsa2009-62
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-62
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
11
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3376
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5bdt-dd2k-c7gq
5
url VCID-aw3w-yap1-u7cx
vulnerability_id VCID-aw3w-yap1-u7cx
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3375.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3375.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3375
reference_id
reference_type
scores
0
value 0.00462
scoring_system epss
scoring_elements 0.64221
published_at 2026-04-16T12:55:00Z
1
value 0.00462
scoring_system epss
scoring_elements 0.64102
published_at 2026-04-01T12:55:00Z
2
value 0.00462
scoring_system epss
scoring_elements 0.64158
published_at 2026-04-02T12:55:00Z
3
value 0.00462
scoring_system epss
scoring_elements 0.64186
published_at 2026-04-13T12:55:00Z
4
value 0.00462
scoring_system epss
scoring_elements 0.64146
published_at 2026-04-07T12:55:00Z
5
value 0.00462
scoring_system epss
scoring_elements 0.64196
published_at 2026-04-08T12:55:00Z
6
value 0.00462
scoring_system epss
scoring_elements 0.64212
published_at 2026-04-09T12:55:00Z
7
value 0.00462
scoring_system epss
scoring_elements 0.64226
published_at 2026-04-11T12:55:00Z
8
value 0.00462
scoring_system epss
scoring_elements 0.64215
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3375
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530167
reference_id 530167
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530167
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375
reference_id CVE-2009-3375
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-61
reference_id mfsa2009-61
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-61
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3375
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aw3w-yap1-u7cx
6
url VCID-b76x-3z8j-4fa9
vulnerability_id VCID-b76x-3z8j-4fa9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3274.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3274.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3274
reference_id
reference_type
scores
0
value 0.0014
scoring_system epss
scoring_elements 0.34148
published_at 2026-04-16T12:55:00Z
1
value 0.0014
scoring_system epss
scoring_elements 0.33873
published_at 2026-04-01T12:55:00Z
2
value 0.0014
scoring_system epss
scoring_elements 0.34211
published_at 2026-04-02T12:55:00Z
3
value 0.0014
scoring_system epss
scoring_elements 0.34244
published_at 2026-04-04T12:55:00Z
4
value 0.0014
scoring_system epss
scoring_elements 0.34106
published_at 2026-04-07T12:55:00Z
5
value 0.0014
scoring_system epss
scoring_elements 0.34149
published_at 2026-04-08T12:55:00Z
6
value 0.0014
scoring_system epss
scoring_elements 0.34178
published_at 2026-04-11T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.34135
published_at 2026-04-12T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.34111
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3274
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=524815
reference_id 524815
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=524815
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274
reference_id CVE-2009-3274
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-53
reference_id mfsa2009-53
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-53
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3274
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b76x-3z8j-4fa9
7
url VCID-h68j-ht6w-jqbm
vulnerability_id VCID-h68j-ht6w-jqbm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3373.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3373
reference_id
reference_type
scores
0
value 0.11615
scoring_system epss
scoring_elements 0.9367
published_at 2026-04-16T12:55:00Z
1
value 0.11615
scoring_system epss
scoring_elements 0.93616
published_at 2026-04-01T12:55:00Z
2
value 0.11615
scoring_system epss
scoring_elements 0.93625
published_at 2026-04-02T12:55:00Z
3
value 0.11615
scoring_system epss
scoring_elements 0.93634
published_at 2026-04-04T12:55:00Z
4
value 0.11615
scoring_system epss
scoring_elements 0.93636
published_at 2026-04-07T12:55:00Z
5
value 0.11615
scoring_system epss
scoring_elements 0.93645
published_at 2026-04-08T12:55:00Z
6
value 0.11615
scoring_system epss
scoring_elements 0.93647
published_at 2026-04-09T12:55:00Z
7
value 0.11615
scoring_system epss
scoring_elements 0.93651
published_at 2026-04-12T12:55:00Z
8
value 0.11615
scoring_system epss
scoring_elements 0.93652
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3373
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530156
reference_id 530156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530156
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373
reference_id CVE-2009-3373
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33313.txt
reference_id CVE-2009-3373;OSVDB-59393
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33313.txt
5
reference_url https://www.securityfocus.com/bid/36855/info
reference_id CVE-2009-3373;OSVDB-59393
reference_type exploit
scores
url https://www.securityfocus.com/bid/36855/info
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-56
reference_id mfsa2009-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-56
8
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
9
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3373
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h68j-ht6w-jqbm
8
url VCID-nx8g-hhbk-yyep
vulnerability_id VCID-nx8g-hhbk-yyep
summary
Mozilla upgraded several third party libraries used in media
rendering to address multiple memory safety and stability bugs
identified by members of the Mozilla community.  Some of the bugs
discovered could potentially be used by an attacker to crash a
victim's browser and execute arbitrary code on their
computer.  liboggz, libvorbis,
and liboggplay were all upgraded to address these
issues.Audio and video capabilities were added in Firefox 3.5
so prior releases of Firefox were not affected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3370.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3370
reference_id
reference_type
scores
0
value 0.00556
scoring_system epss
scoring_elements 0.68185
published_at 2026-04-16T12:55:00Z
1
value 0.00556
scoring_system epss
scoring_elements 0.6818
published_at 2026-04-12T12:55:00Z
2
value 0.00556
scoring_system epss
scoring_elements 0.68147
published_at 2026-04-13T12:55:00Z
3
value 0.00556
scoring_system epss
scoring_elements 0.68084
published_at 2026-04-01T12:55:00Z
4
value 0.00556
scoring_system epss
scoring_elements 0.68107
published_at 2026-04-02T12:55:00Z
5
value 0.00556
scoring_system epss
scoring_elements 0.68125
published_at 2026-04-04T12:55:00Z
6
value 0.00556
scoring_system epss
scoring_elements 0.68102
published_at 2026-04-07T12:55:00Z
7
value 0.00556
scoring_system epss
scoring_elements 0.68154
published_at 2026-04-08T12:55:00Z
8
value 0.00556
scoring_system epss
scoring_elements 0.68169
published_at 2026-04-09T12:55:00Z
9
value 0.00556
scoring_system epss
scoring_elements 0.68194
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3370
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530151
reference_id 530151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530151
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370
reference_id CVE-2009-3370
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-52
reference_id mfsa2009-52
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-52
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
reference_id mfsa2009-63
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-63
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3370
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx8g-hhbk-yyep
9
url VCID-qqg4-kz4u-hbh8
vulnerability_id VCID-qqg4-kz4u-hbh8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1563.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1563.json
1
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530162
reference_id 530162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530162
2
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
3
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
4
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
5
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-1563
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qqg4-kz4u-hbh8
10
url VCID-sua6-rkjm-qyge
vulnerability_id VCID-sua6-rkjm-qyge
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3382.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3382
reference_id
reference_type
scores
0
value 0.15845
scoring_system epss
scoring_elements 0.94754
published_at 2026-04-16T12:55:00Z
1
value 0.15845
scoring_system epss
scoring_elements 0.94709
published_at 2026-04-01T12:55:00Z
2
value 0.15845
scoring_system epss
scoring_elements 0.94717
published_at 2026-04-02T12:55:00Z
3
value 0.15845
scoring_system epss
scoring_elements 0.94721
published_at 2026-04-04T12:55:00Z
4
value 0.15845
scoring_system epss
scoring_elements 0.94723
published_at 2026-04-07T12:55:00Z
5
value 0.15845
scoring_system epss
scoring_elements 0.94733
published_at 2026-04-08T12:55:00Z
6
value 0.15845
scoring_system epss
scoring_elements 0.94737
published_at 2026-04-09T12:55:00Z
7
value 0.15845
scoring_system epss
scoring_elements 0.94741
published_at 2026-04-11T12:55:00Z
8
value 0.15845
scoring_system epss
scoring_elements 0.94745
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3382
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530569
reference_id 530569
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530569
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382
reference_id CVE-2009-3382
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33314.html
reference_id CVE-2009-3382;OSVDB-59384
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33314.html
5
reference_url https://www.securityfocus.com/bid/36866/info
reference_id CVE-2009-3382;OSVDB-59384
reference_type exploit
scores
url https://www.securityfocus.com/bid/36866/info
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-64
reference_id mfsa2009-64
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-64
8
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
9
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3382
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sua6-rkjm-qyge
11
url VCID-yn4z-ymst-1bew
vulnerability_id VCID-yn4z-ymst-1bew
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3380.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3380.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3380
reference_id
reference_type
scores
0
value 0.0364
scoring_system epss
scoring_elements 0.87867
published_at 2026-04-16T12:55:00Z
1
value 0.0364
scoring_system epss
scoring_elements 0.87795
published_at 2026-04-01T12:55:00Z
2
value 0.0364
scoring_system epss
scoring_elements 0.87806
published_at 2026-04-02T12:55:00Z
3
value 0.0364
scoring_system epss
scoring_elements 0.87817
published_at 2026-04-04T12:55:00Z
4
value 0.0364
scoring_system epss
scoring_elements 0.8782
published_at 2026-04-07T12:55:00Z
5
value 0.0364
scoring_system epss
scoring_elements 0.87842
published_at 2026-04-08T12:55:00Z
6
value 0.0364
scoring_system epss
scoring_elements 0.87849
published_at 2026-04-09T12:55:00Z
7
value 0.0364
scoring_system epss
scoring_elements 0.8786
published_at 2026-04-11T12:55:00Z
8
value 0.0364
scoring_system epss
scoring_elements 0.87854
published_at 2026-04-12T12:55:00Z
9
value 0.0364
scoring_system epss
scoring_elements 0.87853
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3380
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530567
reference_id 530567
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530567
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380
reference_id CVE-2009-3380
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-64
reference_id mfsa2009-64
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-64
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
aliases CVE-2009-3380
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yn4z-ymst-1bew
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@3.0.15-3%3Farch=el5_4