Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/128519?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/128519?format=api", "purl": "pkg:rpm/redhat/xulrunner@1.9.0.9-1?arch=el5", "type": "rpm", "namespace": "redhat", "name": "xulrunner", "version": "1.9.0.9-1", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52497?format=api", "vulnerability_id": "VCID-33yw-68n5-kfb3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1303.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1303.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1303", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86136", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86064", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.8608", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86079", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86099", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86109", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86124", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86122", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02802", "scoring_system": "epss", "scoring_elements": "0.86118", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1303" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496253", "reference_id": "496253", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496253" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303", "reference_id": "CVE-2009-1303", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14", "reference_id": "mfsa2009-14", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1125", "reference_id": "RHSA-2009:1125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1126", "reference_id": "RHSA-2009:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1126" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" }, { "reference_url": "https://usn.ubuntu.com/782-1/", "reference_id": "USN-782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/782-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1303" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-33yw-68n5-kfb3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52531?format=api", "vulnerability_id": "VCID-47pj-sw4a-wueh", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1310.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1310.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1310", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75068", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.74986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.74989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75018", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.74994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75028", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.7504", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75062", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75041", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.7503", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1310" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496270", "reference_id": "496270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496270" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310", "reference_id": "CVE-2009-1310", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-20", "reference_id": "mfsa2009-20", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1310" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-47pj-sw4a-wueh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52504?format=api", "vulnerability_id": "VCID-ah3s-3djr-3bba", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1304.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.91244", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.91169", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.91174", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.91183", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.9119", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.91203", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.9121", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.91216", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.9122", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06664", "scoring_system": "epss", "scoring_elements": "0.91219", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1304" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496255", "reference_id": "496255", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496255" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304", "reference_id": "CVE-2009-1304", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14", "reference_id": "mfsa2009-14", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1304" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ah3s-3djr-3bba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52521?format=api", "vulnerability_id": "VCID-b7zf-d56n-ekek", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1308.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1308.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1308", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78071", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77978", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77986", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.77998", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78024", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78055", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01099", "scoring_system": "epss", "scoring_elements": "0.78035", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1308" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496266", "reference_id": "496266", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496266" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308", "reference_id": "CVE-2009-1308", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-18", "reference_id": "mfsa2009-18", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1126", "reference_id": "RHSA-2009:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1126" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" }, { "reference_url": "https://usn.ubuntu.com/782-1/", "reference_id": "USN-782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/782-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1308" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b7zf-d56n-ekek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52509?format=api", "vulnerability_id": "VCID-bf27-12ap-bbau", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1305.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1305.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1305", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89384", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89327", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89332", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89343", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89345", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89362", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89366", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89375", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89372", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04708", "scoring_system": "epss", "scoring_elements": "0.89368", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1305" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496256", "reference_id": "496256", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305", "reference_id": "CVE-2009-1305", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14", "reference_id": "mfsa2009-14", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1125", "reference_id": "RHSA-2009:1125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1126", "reference_id": "RHSA-2009:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1126" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" }, { "reference_url": "https://usn.ubuntu.com/782-1/", "reference_id": "USN-782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/782-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1305" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bf27-12ap-bbau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52443?format=api", "vulnerability_id": "VCID-bfqj-npmp-auek", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html" }, { "reference_url": "http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2009-0437.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2009-0437.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0652.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84206", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84115", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84188", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84146", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84148", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.8417", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84176", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02133", "scoring_system": "epss", "scoring_elements": "0.84194", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0652" }, { "reference_url": "http://secunia.com/advisories/34096", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34096" }, { "reference_url": "http://secunia.com/advisories/34843", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34843" }, { "reference_url": "http://secunia.com/advisories/34844", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34844" }, { "reference_url": "http://secunia.com/advisories/34894", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34894" }, { "reference_url": "http://secunia.com/advisories/35042", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35042" }, { "reference_url": "http://secunia.com/advisories/35065", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35065" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48974", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48974" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11396", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11396" }, { "reference_url": "https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html" }, { "reference_url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1797" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1830", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1830" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:111" }, { "reference_url": "http://www.mozilla.org/security/announce/2009/mfsa2009-15.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2009/mfsa2009-15.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0436.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0436.html" }, { "reference_url": "http://www.securityfocus.com/bid/33837", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33837" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1125", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1125" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=486704", "reference_id": "486704", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486704" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652", "reference_id": "CVE-2009-0652", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0652", "reference_id": "CVE-2009-0652", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0652" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-15", "reference_id": "mfsa2009-15", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-0652" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bfqj-npmp-auek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52516?format=api", "vulnerability_id": "VCID-j3ev-79tv-6ybf", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1307", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80264", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80182", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80189", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80198", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.8024", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01373", "scoring_system": "epss", "scoring_elements": "0.80234", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1307" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496263", "reference_id": "496263", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496263" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307", "reference_id": "CVE-2009-1307", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-17", "reference_id": "mfsa2009-17", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-17" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1125", "reference_id": "RHSA-2009:1125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1126", "reference_id": "RHSA-2009:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1126" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" }, { "reference_url": "https://usn.ubuntu.com/782-1/", "reference_id": "USN-782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/782-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1307" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j3ev-79tv-6ybf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52526?format=api", "vulnerability_id": "VCID-k9rr-wea1-v3f7", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1309.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82627", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82526", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82555", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82551", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82577", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82603", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.82597", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01757", "scoring_system": "epss", "scoring_elements": "0.8259", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1309" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496267", "reference_id": "496267", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496267" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309", "reference_id": "CVE-2009-1309", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-19", "reference_id": "mfsa2009-19", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-19" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1125", "reference_id": "RHSA-2009:1125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1126", "reference_id": "RHSA-2009:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1126" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" }, { "reference_url": "https://usn.ubuntu.com/782-1/", "reference_id": "USN-782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/782-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1309" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k9rr-wea1-v3f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52542?format=api", "vulnerability_id": "VCID-tvr2-ecx3-d3gq", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1312.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1312.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1312", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90391", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90336", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.9035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90368", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90382", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05662", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1312" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496274", "reference_id": "496274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496274" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312", "reference_id": "CVE-2009-1312", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32942.txt", "reference_id": "CVE-2009-1312;OSVDB-53952", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32942.txt" }, { "reference_url": "https://www.securityfocus.com/bid/34656/info", "reference_id": "CVE-2009-1312;OSVDB-53952", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/34656/info" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-22", "reference_id": "mfsa2009-22", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1312" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tvr2-ecx3-d3gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52535?format=api", "vulnerability_id": "VCID-u3bz-getz-jub6", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78734", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78655", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78661", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78692", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78673", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78699", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78706", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78731", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78713", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01175", "scoring_system": "epss", "scoring_elements": "0.78705", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1311" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496271", "reference_id": "496271", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311", "reference_id": "CVE-2009-1311", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-21", "reference_id": "mfsa2009-21", "reference_type": "", "scores": [ { "value": "low", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1311" ], "risk_score": 1.4, "exploitability": "0.5", "weighted_severity": "2.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u3bz-getz-jub6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52494?format=api", "vulnerability_id": "VCID-vd5h-d9n3-pfbx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1302.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1302.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1302", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.8901", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88949", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88965", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88968", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88991", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.89003", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88998", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04391", "scoring_system": "epss", "scoring_elements": "0.88996", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1302" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496252", "reference_id": "496252", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496252" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302", "reference_id": "CVE-2009-1302", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14", "reference_id": "mfsa2009-14", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1302" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vd5h-d9n3-pfbx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52513?format=api", "vulnerability_id": "VCID-vx2r-t51d-73h5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1306.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1306.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1306", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82995", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82893", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82922", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82943", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.8295", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82966", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01841", "scoring_system": "epss", "scoring_elements": "0.82957", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-1306" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=496262", "reference_id": "496262", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496262" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306", "reference_id": "CVE-2009-1306", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-16", "reference_id": "mfsa2009-16", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-16" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0436", "reference_id": "RHSA-2009:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0437", "reference_id": "RHSA-2009:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1125", "reference_id": "RHSA-2009:1125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1126", "reference_id": "RHSA-2009:1126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1126" }, { "reference_url": "https://usn.ubuntu.com/764-1/", "reference_id": "USN-764-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/764-1/" }, { "reference_url": "https://usn.ubuntu.com/782-1/", "reference_id": "USN-782-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/782-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-1306" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vx2r-t51d-73h5" } ], "fixing_vulnerabilities": [], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/xulrunner@1.9.0.9-1%3Farch=el5" }