Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/xulrunner@1.9.0.9-1?arch=el5
Typerpm
Namespaceredhat
Namexulrunner
Version1.9.0.9-1
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-33yw-68n5-kfb3
vulnerability_id VCID-33yw-68n5-kfb3
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1303.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1303.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1303
reference_id
reference_type
scores
0
value 0.02802
scoring_system epss
scoring_elements 0.86136
published_at 2026-04-16T12:55:00Z
1
value 0.02802
scoring_system epss
scoring_elements 0.86053
published_at 2026-04-01T12:55:00Z
2
value 0.02802
scoring_system epss
scoring_elements 0.86064
published_at 2026-04-02T12:55:00Z
3
value 0.02802
scoring_system epss
scoring_elements 0.8608
published_at 2026-04-04T12:55:00Z
4
value 0.02802
scoring_system epss
scoring_elements 0.86079
published_at 2026-04-07T12:55:00Z
5
value 0.02802
scoring_system epss
scoring_elements 0.86099
published_at 2026-04-08T12:55:00Z
6
value 0.02802
scoring_system epss
scoring_elements 0.86109
published_at 2026-04-09T12:55:00Z
7
value 0.02802
scoring_system epss
scoring_elements 0.86124
published_at 2026-04-11T12:55:00Z
8
value 0.02802
scoring_system epss
scoring_elements 0.86122
published_at 2026-04-12T12:55:00Z
9
value 0.02802
scoring_system epss
scoring_elements 0.86118
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1303
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496253
reference_id 496253
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496253
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303
reference_id CVE-2009-1303
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
reference_id mfsa2009-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
aliases CVE-2009-1303
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-33yw-68n5-kfb3
1
url VCID-47pj-sw4a-wueh
vulnerability_id VCID-47pj-sw4a-wueh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1310.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1310.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1310
reference_id
reference_type
scores
0
value 0.0086
scoring_system epss
scoring_elements 0.75068
published_at 2026-04-16T12:55:00Z
1
value 0.0086
scoring_system epss
scoring_elements 0.74986
published_at 2026-04-01T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.74989
published_at 2026-04-02T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.75018
published_at 2026-04-04T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.74994
published_at 2026-04-07T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75028
published_at 2026-04-08T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-09T12:55:00Z
7
value 0.0086
scoring_system epss
scoring_elements 0.75062
published_at 2026-04-11T12:55:00Z
8
value 0.0086
scoring_system epss
scoring_elements 0.75041
published_at 2026-04-12T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.7503
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1310
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496270
reference_id 496270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496270
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310
reference_id CVE-2009-1310
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-20
reference_id mfsa2009-20
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-20
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
aliases CVE-2009-1310
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47pj-sw4a-wueh
2
url VCID-ah3s-3djr-3bba
vulnerability_id VCID-ah3s-3djr-3bba
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1304.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1304.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1304
reference_id
reference_type
scores
0
value 0.06664
scoring_system epss
scoring_elements 0.91244
published_at 2026-04-16T12:55:00Z
1
value 0.06664
scoring_system epss
scoring_elements 0.91169
published_at 2026-04-01T12:55:00Z
2
value 0.06664
scoring_system epss
scoring_elements 0.91174
published_at 2026-04-02T12:55:00Z
3
value 0.06664
scoring_system epss
scoring_elements 0.91183
published_at 2026-04-04T12:55:00Z
4
value 0.06664
scoring_system epss
scoring_elements 0.9119
published_at 2026-04-07T12:55:00Z
5
value 0.06664
scoring_system epss
scoring_elements 0.91203
published_at 2026-04-08T12:55:00Z
6
value 0.06664
scoring_system epss
scoring_elements 0.9121
published_at 2026-04-09T12:55:00Z
7
value 0.06664
scoring_system epss
scoring_elements 0.91216
published_at 2026-04-11T12:55:00Z
8
value 0.06664
scoring_system epss
scoring_elements 0.9122
published_at 2026-04-12T12:55:00Z
9
value 0.06664
scoring_system epss
scoring_elements 0.91219
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1304
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496255
reference_id 496255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496255
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304
reference_id CVE-2009-1304
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
reference_id mfsa2009-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
aliases CVE-2009-1304
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ah3s-3djr-3bba
3
url VCID-b7zf-d56n-ekek
vulnerability_id VCID-b7zf-d56n-ekek
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1308.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1308
reference_id
reference_type
scores
0
value 0.01099
scoring_system epss
scoring_elements 0.78071
published_at 2026-04-16T12:55:00Z
1
value 0.01099
scoring_system epss
scoring_elements 0.77978
published_at 2026-04-01T12:55:00Z
2
value 0.01099
scoring_system epss
scoring_elements 0.77986
published_at 2026-04-02T12:55:00Z
3
value 0.01099
scoring_system epss
scoring_elements 0.78015
published_at 2026-04-04T12:55:00Z
4
value 0.01099
scoring_system epss
scoring_elements 0.77998
published_at 2026-04-07T12:55:00Z
5
value 0.01099
scoring_system epss
scoring_elements 0.78024
published_at 2026-04-08T12:55:00Z
6
value 0.01099
scoring_system epss
scoring_elements 0.78028
published_at 2026-04-09T12:55:00Z
7
value 0.01099
scoring_system epss
scoring_elements 0.78055
published_at 2026-04-11T12:55:00Z
8
value 0.01099
scoring_system epss
scoring_elements 0.78037
published_at 2026-04-12T12:55:00Z
9
value 0.01099
scoring_system epss
scoring_elements 0.78035
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1308
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496266
reference_id 496266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496266
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308
reference_id CVE-2009-1308
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-18
reference_id mfsa2009-18
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-18
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
8
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
9
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
aliases CVE-2009-1308
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7zf-d56n-ekek
4
url VCID-bf27-12ap-bbau
vulnerability_id VCID-bf27-12ap-bbau
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1305.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1305.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1305
reference_id
reference_type
scores
0
value 0.04708
scoring_system epss
scoring_elements 0.89384
published_at 2026-04-16T12:55:00Z
1
value 0.04708
scoring_system epss
scoring_elements 0.89327
published_at 2026-04-01T12:55:00Z
2
value 0.04708
scoring_system epss
scoring_elements 0.89332
published_at 2026-04-02T12:55:00Z
3
value 0.04708
scoring_system epss
scoring_elements 0.89343
published_at 2026-04-04T12:55:00Z
4
value 0.04708
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-07T12:55:00Z
5
value 0.04708
scoring_system epss
scoring_elements 0.89362
published_at 2026-04-08T12:55:00Z
6
value 0.04708
scoring_system epss
scoring_elements 0.89366
published_at 2026-04-09T12:55:00Z
7
value 0.04708
scoring_system epss
scoring_elements 0.89375
published_at 2026-04-11T12:55:00Z
8
value 0.04708
scoring_system epss
scoring_elements 0.89372
published_at 2026-04-12T12:55:00Z
9
value 0.04708
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1305
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496256
reference_id 496256
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496256
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305
reference_id CVE-2009-1305
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
reference_id mfsa2009-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
aliases CVE-2009-1305
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bf27-12ap-bbau
5
url VCID-bfqj-npmp-auek
vulnerability_id VCID-bfqj-npmp-auek
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html
reference_id
reference_type
scores
url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html
1
reference_url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html
reference_id
reference_type
scores
url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2009-0437.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2009-0437.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0652.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0652.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0652
reference_id
reference_type
scores
0
value 0.02133
scoring_system epss
scoring_elements 0.84206
published_at 2026-04-16T12:55:00Z
1
value 0.02133
scoring_system epss
scoring_elements 0.84115
published_at 2026-04-01T12:55:00Z
2
value 0.02133
scoring_system epss
scoring_elements 0.84188
published_at 2026-04-12T12:55:00Z
3
value 0.02133
scoring_system epss
scoring_elements 0.84185
published_at 2026-04-13T12:55:00Z
4
value 0.02133
scoring_system epss
scoring_elements 0.84128
published_at 2026-04-02T12:55:00Z
5
value 0.02133
scoring_system epss
scoring_elements 0.84146
published_at 2026-04-04T12:55:00Z
6
value 0.02133
scoring_system epss
scoring_elements 0.84148
published_at 2026-04-07T12:55:00Z
7
value 0.02133
scoring_system epss
scoring_elements 0.8417
published_at 2026-04-08T12:55:00Z
8
value 0.02133
scoring_system epss
scoring_elements 0.84176
published_at 2026-04-09T12:55:00Z
9
value 0.02133
scoring_system epss
scoring_elements 0.84194
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0652
6
reference_url http://secunia.com/advisories/34096
reference_id
reference_type
scores
url http://secunia.com/advisories/34096
7
reference_url http://secunia.com/advisories/34843
reference_id
reference_type
scores
url http://secunia.com/advisories/34843
8
reference_url http://secunia.com/advisories/34844
reference_id
reference_type
scores
url http://secunia.com/advisories/34844
9
reference_url http://secunia.com/advisories/34894
reference_id
reference_type
scores
url http://secunia.com/advisories/34894
10
reference_url http://secunia.com/advisories/35042
reference_id
reference_type
scores
url http://secunia.com/advisories/35042
11
reference_url http://secunia.com/advisories/35065
reference_id
reference_type
scores
url http://secunia.com/advisories/35065
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48974
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48974
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11396
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11396
14
reference_url https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
reference_id
reference_type
scores
url https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
15
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html
16
reference_url http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike
reference_id
reference_type
scores
url http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike
17
reference_url http://www.debian.org/security/2009/dsa-1797
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1797
18
reference_url http://www.debian.org/security/2009/dsa-1830
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1830
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:111
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:111
20
reference_url http://www.mozilla.org/security/announce/2009/mfsa2009-15.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2009/mfsa2009-15.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2009-0436.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0436.html
22
reference_url http://www.securityfocus.com/bid/33837
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33837
23
reference_url http://www.vupen.com/english/advisories/2009/1125
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1125
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=486704
reference_id 486704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=486704
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652
reference_id CVE-2009-0652
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652
114
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0652
reference_id CVE-2009-0652
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0652
115
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
116
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-15
reference_id mfsa2009-15
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-15
117
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
118
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
119
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
aliases CVE-2009-0652
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfqj-npmp-auek
6
url VCID-j3ev-79tv-6ybf
vulnerability_id VCID-j3ev-79tv-6ybf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1307
reference_id
reference_type
scores
0
value 0.01373
scoring_system epss
scoring_elements 0.80264
published_at 2026-04-16T12:55:00Z
1
value 0.01373
scoring_system epss
scoring_elements 0.80182
published_at 2026-04-01T12:55:00Z
2
value 0.01373
scoring_system epss
scoring_elements 0.80189
published_at 2026-04-02T12:55:00Z
3
value 0.01373
scoring_system epss
scoring_elements 0.80209
published_at 2026-04-04T12:55:00Z
4
value 0.01373
scoring_system epss
scoring_elements 0.80198
published_at 2026-04-07T12:55:00Z
5
value 0.01373
scoring_system epss
scoring_elements 0.80227
published_at 2026-04-08T12:55:00Z
6
value 0.01373
scoring_system epss
scoring_elements 0.80237
published_at 2026-04-09T12:55:00Z
7
value 0.01373
scoring_system epss
scoring_elements 0.80255
published_at 2026-04-11T12:55:00Z
8
value 0.01373
scoring_system epss
scoring_elements 0.8024
published_at 2026-04-12T12:55:00Z
9
value 0.01373
scoring_system epss
scoring_elements 0.80234
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1307
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496263
reference_id 496263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496263
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307
reference_id CVE-2009-1307
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-17
reference_id mfsa2009-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-17
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
aliases CVE-2009-1307
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j3ev-79tv-6ybf
7
url VCID-k9rr-wea1-v3f7
vulnerability_id VCID-k9rr-wea1-v3f7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1309.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1309
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82627
published_at 2026-04-16T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.82526
published_at 2026-04-01T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-02T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82555
published_at 2026-04-04T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.82551
published_at 2026-04-07T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82577
published_at 2026-04-08T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-09T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-11T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.82597
published_at 2026-04-12T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.8259
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1309
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496267
reference_id 496267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496267
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309
reference_id CVE-2009-1309
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-19
reference_id mfsa2009-19
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-19
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
aliases CVE-2009-1309
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9rr-wea1-v3f7
8
url VCID-tvr2-ecx3-d3gq
vulnerability_id VCID-tvr2-ecx3-d3gq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1312.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1312
reference_id
reference_type
scores
0
value 0.05662
scoring_system epss
scoring_elements 0.90391
published_at 2026-04-16T12:55:00Z
1
value 0.05662
scoring_system epss
scoring_elements 0.90336
published_at 2026-04-01T12:55:00Z
2
value 0.05662
scoring_system epss
scoring_elements 0.90339
published_at 2026-04-02T12:55:00Z
3
value 0.05662
scoring_system epss
scoring_elements 0.9035
published_at 2026-04-04T12:55:00Z
4
value 0.05662
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-07T12:55:00Z
5
value 0.05662
scoring_system epss
scoring_elements 0.90368
published_at 2026-04-08T12:55:00Z
6
value 0.05662
scoring_system epss
scoring_elements 0.90375
published_at 2026-04-09T12:55:00Z
7
value 0.05662
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-12T12:55:00Z
8
value 0.05662
scoring_system epss
scoring_elements 0.90376
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1312
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496274
reference_id 496274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312
reference_id CVE-2009-1312
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32942.txt
reference_id CVE-2009-1312;OSVDB-53952
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32942.txt
5
reference_url https://www.securityfocus.com/bid/34656/info
reference_id CVE-2009-1312;OSVDB-53952
reference_type exploit
scores
url https://www.securityfocus.com/bid/34656/info
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-22
reference_id mfsa2009-22
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-22
8
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
9
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
aliases CVE-2009-1312
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvr2-ecx3-d3gq
9
url VCID-u3bz-getz-jub6
vulnerability_id VCID-u3bz-getz-jub6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1311
reference_id
reference_type
scores
0
value 0.01175
scoring_system epss
scoring_elements 0.78734
published_at 2026-04-16T12:55:00Z
1
value 0.01175
scoring_system epss
scoring_elements 0.78655
published_at 2026-04-01T12:55:00Z
2
value 0.01175
scoring_system epss
scoring_elements 0.78661
published_at 2026-04-02T12:55:00Z
3
value 0.01175
scoring_system epss
scoring_elements 0.78692
published_at 2026-04-04T12:55:00Z
4
value 0.01175
scoring_system epss
scoring_elements 0.78673
published_at 2026-04-07T12:55:00Z
5
value 0.01175
scoring_system epss
scoring_elements 0.78699
published_at 2026-04-08T12:55:00Z
6
value 0.01175
scoring_system epss
scoring_elements 0.78706
published_at 2026-04-09T12:55:00Z
7
value 0.01175
scoring_system epss
scoring_elements 0.78731
published_at 2026-04-11T12:55:00Z
8
value 0.01175
scoring_system epss
scoring_elements 0.78713
published_at 2026-04-12T12:55:00Z
9
value 0.01175
scoring_system epss
scoring_elements 0.78705
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1311
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496271
reference_id 496271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496271
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311
reference_id CVE-2009-1311
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-21
reference_id mfsa2009-21
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-21
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
aliases CVE-2009-1311
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3bz-getz-jub6
10
url VCID-vd5h-d9n3-pfbx
vulnerability_id VCID-vd5h-d9n3-pfbx
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1302.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1302
reference_id
reference_type
scores
0
value 0.04391
scoring_system epss
scoring_elements 0.8901
published_at 2026-04-16T12:55:00Z
1
value 0.04391
scoring_system epss
scoring_elements 0.88941
published_at 2026-04-01T12:55:00Z
2
value 0.04391
scoring_system epss
scoring_elements 0.88949
published_at 2026-04-02T12:55:00Z
3
value 0.04391
scoring_system epss
scoring_elements 0.88965
published_at 2026-04-04T12:55:00Z
4
value 0.04391
scoring_system epss
scoring_elements 0.88968
published_at 2026-04-07T12:55:00Z
5
value 0.04391
scoring_system epss
scoring_elements 0.88986
published_at 2026-04-08T12:55:00Z
6
value 0.04391
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-09T12:55:00Z
7
value 0.04391
scoring_system epss
scoring_elements 0.89003
published_at 2026-04-11T12:55:00Z
8
value 0.04391
scoring_system epss
scoring_elements 0.88998
published_at 2026-04-12T12:55:00Z
9
value 0.04391
scoring_system epss
scoring_elements 0.88996
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1302
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496252
reference_id 496252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496252
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302
reference_id CVE-2009-1302
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
reference_id mfsa2009-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
aliases CVE-2009-1302
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vd5h-d9n3-pfbx
11
url VCID-vx2r-t51d-73h5
vulnerability_id VCID-vx2r-t51d-73h5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1306.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1306.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1306
reference_id
reference_type
scores
0
value 0.01841
scoring_system epss
scoring_elements 0.82995
published_at 2026-04-16T12:55:00Z
1
value 0.01841
scoring_system epss
scoring_elements 0.82893
published_at 2026-04-01T12:55:00Z
2
value 0.01841
scoring_system epss
scoring_elements 0.82909
published_at 2026-04-02T12:55:00Z
3
value 0.01841
scoring_system epss
scoring_elements 0.82922
published_at 2026-04-04T12:55:00Z
4
value 0.01841
scoring_system epss
scoring_elements 0.82918
published_at 2026-04-07T12:55:00Z
5
value 0.01841
scoring_system epss
scoring_elements 0.82943
published_at 2026-04-08T12:55:00Z
6
value 0.01841
scoring_system epss
scoring_elements 0.8295
published_at 2026-04-09T12:55:00Z
7
value 0.01841
scoring_system epss
scoring_elements 0.82966
published_at 2026-04-11T12:55:00Z
8
value 0.01841
scoring_system epss
scoring_elements 0.82961
published_at 2026-04-12T12:55:00Z
9
value 0.01841
scoring_system epss
scoring_elements 0.82957
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1306
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496262
reference_id 496262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496262
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306
reference_id CVE-2009-1306
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-16
reference_id mfsa2009-16
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-16
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
aliases CVE-2009-1306
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vx2r-t51d-73h5
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@1.9.0.9-1%3Farch=el5