Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/seamonkey@1.0.9-0.40?arch=el3
Typerpm
Namespaceredhat
Nameseamonkey
Version1.0.9-0.40
Qualifiers
arch el3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-53kn-ev4f-dufh
vulnerability_id VCID-53kn-ev4f-dufh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2463.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2463.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2463
reference_id
reference_type
scores
0
value 0.0522
scoring_system epss
scoring_elements 0.89958
published_at 2026-04-21T12:55:00Z
1
value 0.0522
scoring_system epss
scoring_elements 0.89961
published_at 2026-04-16T12:55:00Z
2
value 0.0522
scoring_system epss
scoring_elements 0.89963
published_at 2026-04-18T12:55:00Z
3
value 0.0522
scoring_system epss
scoring_elements 0.89905
published_at 2026-04-01T12:55:00Z
4
value 0.0522
scoring_system epss
scoring_elements 0.89909
published_at 2026-04-02T12:55:00Z
5
value 0.0522
scoring_system epss
scoring_elements 0.89921
published_at 2026-04-04T12:55:00Z
6
value 0.0522
scoring_system epss
scoring_elements 0.89927
published_at 2026-04-07T12:55:00Z
7
value 0.0522
scoring_system epss
scoring_elements 0.89943
published_at 2026-04-08T12:55:00Z
8
value 0.0522
scoring_system epss
scoring_elements 0.89949
published_at 2026-04-09T12:55:00Z
9
value 0.0522
scoring_system epss
scoring_elements 0.89957
published_at 2026-04-11T12:55:00Z
10
value 0.0522
scoring_system epss
scoring_elements 0.89954
published_at 2026-04-12T12:55:00Z
11
value 0.0522
scoring_system epss
scoring_elements 0.89948
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2463
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512131
reference_id 512131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512131
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463
reference_id CVE-2009-2463
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2463
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
reference_id mfsa2009-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
7
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
8
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
9
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
10
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
11
reference_url https://usn.ubuntu.com/798-1/
reference_id USN-798-1
reference_type
scores
url https://usn.ubuntu.com/798-1/
12
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-2463
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53kn-ev4f-dufh
1
url VCID-cwsk-1qr2-1fed
vulnerability_id VCID-cwsk-1qr2-1fed
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2466.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2466
reference_id
reference_type
scores
0
value 0.05821
scoring_system epss
scoring_elements 0.90542
published_at 2026-04-21T12:55:00Z
1
value 0.05821
scoring_system epss
scoring_elements 0.90486
published_at 2026-04-01T12:55:00Z
2
value 0.05821
scoring_system epss
scoring_elements 0.9049
published_at 2026-04-02T12:55:00Z
3
value 0.05821
scoring_system epss
scoring_elements 0.905
published_at 2026-04-04T12:55:00Z
4
value 0.05821
scoring_system epss
scoring_elements 0.90506
published_at 2026-04-07T12:55:00Z
5
value 0.05821
scoring_system epss
scoring_elements 0.90518
published_at 2026-04-08T12:55:00Z
6
value 0.05821
scoring_system epss
scoring_elements 0.90525
published_at 2026-04-09T12:55:00Z
7
value 0.05821
scoring_system epss
scoring_elements 0.90533
published_at 2026-04-12T12:55:00Z
8
value 0.05821
scoring_system epss
scoring_elements 0.90526
published_at 2026-04-13T12:55:00Z
9
value 0.05821
scoring_system epss
scoring_elements 0.90544
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2466
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512136
reference_id 512136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512136
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2466
reference_id CVE-2009-2466
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2466
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
reference_id mfsa2009-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
6
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
7
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/798-1/
reference_id USN-798-1
reference_type
scores
url https://usn.ubuntu.com/798-1/
fixed_packages
aliases CVE-2009-2466
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwsk-1qr2-1fed
2
url VCID-sapd-n7mr-eudc
vulnerability_id VCID-sapd-n7mr-eudc
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2470.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2470.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2470
reference_id
reference_type
scores
0
value 0.0266
scoring_system epss
scoring_elements 0.85803
published_at 2026-04-21T12:55:00Z
1
value 0.0266
scoring_system epss
scoring_elements 0.85713
published_at 2026-04-01T12:55:00Z
2
value 0.0266
scoring_system epss
scoring_elements 0.85725
published_at 2026-04-02T12:55:00Z
3
value 0.0266
scoring_system epss
scoring_elements 0.85744
published_at 2026-04-04T12:55:00Z
4
value 0.0266
scoring_system epss
scoring_elements 0.8575
published_at 2026-04-07T12:55:00Z
5
value 0.0266
scoring_system epss
scoring_elements 0.85769
published_at 2026-04-08T12:55:00Z
6
value 0.0266
scoring_system epss
scoring_elements 0.85779
published_at 2026-04-09T12:55:00Z
7
value 0.0266
scoring_system epss
scoring_elements 0.85794
published_at 2026-04-11T12:55:00Z
8
value 0.0266
scoring_system epss
scoring_elements 0.85791
published_at 2026-04-12T12:55:00Z
9
value 0.0266
scoring_system epss
scoring_elements 0.85787
published_at 2026-04-13T12:55:00Z
10
value 0.0266
scoring_system epss
scoring_elements 0.85805
published_at 2026-04-16T12:55:00Z
11
value 0.0266
scoring_system epss
scoring_elements 0.8581
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2470
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512145
reference_id 512145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512145
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470
reference_id CVE-2009-2470
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-38
reference_id mfsa2009-38
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-38
6
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
7
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
fixed_packages
aliases CVE-2009-2470
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sapd-n7mr-eudc
3
url VCID-v7mb-nqbm-93bs
vulnerability_id VCID-v7mb-nqbm-93bs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2462.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2462.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2462
reference_id
reference_type
scores
0
value 0.0345
scoring_system epss
scoring_elements 0.87529
published_at 2026-04-18T12:55:00Z
1
value 0.0345
scoring_system epss
scoring_elements 0.87458
published_at 2026-04-01T12:55:00Z
2
value 0.0345
scoring_system epss
scoring_elements 0.87468
published_at 2026-04-02T12:55:00Z
3
value 0.0345
scoring_system epss
scoring_elements 0.87481
published_at 2026-04-04T12:55:00Z
4
value 0.0345
scoring_system epss
scoring_elements 0.87483
published_at 2026-04-07T12:55:00Z
5
value 0.0345
scoring_system epss
scoring_elements 0.87503
published_at 2026-04-08T12:55:00Z
6
value 0.0345
scoring_system epss
scoring_elements 0.87509
published_at 2026-04-09T12:55:00Z
7
value 0.0345
scoring_system epss
scoring_elements 0.87521
published_at 2026-04-11T12:55:00Z
8
value 0.0345
scoring_system epss
scoring_elements 0.87516
published_at 2026-04-12T12:55:00Z
9
value 0.0345
scoring_system epss
scoring_elements 0.87513
published_at 2026-04-13T12:55:00Z
10
value 0.0345
scoring_system epss
scoring_elements 0.87527
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2462
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=512128
reference_id 512128
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=512128
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462
reference_id CVE-2009-2462
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2462
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
reference_id mfsa2009-34
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-34
6
reference_url https://access.redhat.com/errata/RHSA-2009:1162
reference_id RHSA-2009:1162
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1162
7
reference_url https://access.redhat.com/errata/RHSA-2009:1163
reference_id RHSA-2009:1163
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1163
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/798-1/
reference_id USN-798-1
reference_type
scores
url https://usn.ubuntu.com/798-1/
fixed_packages
aliases CVE-2009-2462
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v7mb-nqbm-93bs
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.40%3Farch=el3