Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@1.1.19
Typemozilla
Namespace
NameSeaMonkey
Version1.1.19
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.0.0
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-d5ha-6epq-afd4
vulnerability_id VCID-d5ha-6epq-afd4
summary
Security researcher Georgi Guninski
reported that scriptable plugin content, such as Flash objects, could
be loaded and executed in SeaMonkey mail messages by embedding the
content in an iframe inside the message.  If a user were to reply to
or forward such a message, malicious JavaScript embedded in the plugin
content could potentially steal the contents of the message or files
from the local filesystem.Thunderbird was not affected by this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3385.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3385
reference_id
reference_type
scores
0
value 0.01388
scoring_system epss
scoring_elements 0.80457
published_at 2026-05-07T12:55:00Z
1
value 0.01388
scoring_system epss
scoring_elements 0.80282
published_at 2026-04-01T12:55:00Z
2
value 0.01388
scoring_system epss
scoring_elements 0.8029
published_at 2026-04-02T12:55:00Z
3
value 0.01388
scoring_system epss
scoring_elements 0.8031
published_at 2026-04-04T12:55:00Z
4
value 0.01388
scoring_system epss
scoring_elements 0.80298
published_at 2026-04-07T12:55:00Z
5
value 0.01388
scoring_system epss
scoring_elements 0.80326
published_at 2026-04-08T12:55:00Z
6
value 0.01388
scoring_system epss
scoring_elements 0.80337
published_at 2026-04-09T12:55:00Z
7
value 0.01388
scoring_system epss
scoring_elements 0.80355
published_at 2026-04-11T12:55:00Z
8
value 0.01388
scoring_system epss
scoring_elements 0.8034
published_at 2026-04-12T12:55:00Z
9
value 0.01388
scoring_system epss
scoring_elements 0.80334
published_at 2026-04-13T12:55:00Z
10
value 0.01388
scoring_system epss
scoring_elements 0.80363
published_at 2026-04-16T12:55:00Z
11
value 0.01388
scoring_system epss
scoring_elements 0.80365
published_at 2026-04-18T12:55:00Z
12
value 0.01388
scoring_system epss
scoring_elements 0.8037
published_at 2026-04-21T12:55:00Z
13
value 0.01388
scoring_system epss
scoring_elements 0.80396
published_at 2026-04-24T12:55:00Z
14
value 0.01388
scoring_system epss
scoring_elements 0.80403
published_at 2026-04-26T12:55:00Z
15
value 0.01388
scoring_system epss
scoring_elements 0.8042
published_at 2026-04-29T12:55:00Z
16
value 0.01388
scoring_system epss
scoring_elements 0.80435
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3385
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530159
reference_id 530159
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530159
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3385
reference_id CVE-2009-3385
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3385
4
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-06
reference_id mfsa2010-06
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-06
5
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.19
purl pkg:mozilla/SeaMonkey@1.1.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.19
aliases CVE-2009-3385
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d5ha-6epq-afd4
1
url VCID-grm3-5qvy-aud2
vulnerability_id VCID-grm3-5qvy-aud2
summary
Mozilla developers took fixes from previously fixed memory safety
bugs in newer Mozilla-based products and ported them to the Mozilla
1.8.1 branch so they can be utilized by Thunderbird 2 and SeaMonkey
1.1.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0161
reference_id
reference_type
scores
0
value 0.01503
scoring_system epss
scoring_elements 0.81258
published_at 2026-05-07T12:55:00Z
1
value 0.01503
scoring_system epss
scoring_elements 0.81085
published_at 2026-04-01T12:55:00Z
2
value 0.01503
scoring_system epss
scoring_elements 0.81094
published_at 2026-04-02T12:55:00Z
3
value 0.01503
scoring_system epss
scoring_elements 0.81119
published_at 2026-04-04T12:55:00Z
4
value 0.01503
scoring_system epss
scoring_elements 0.81118
published_at 2026-04-07T12:55:00Z
5
value 0.01503
scoring_system epss
scoring_elements 0.81146
published_at 2026-04-08T12:55:00Z
6
value 0.01503
scoring_system epss
scoring_elements 0.81152
published_at 2026-04-09T12:55:00Z
7
value 0.01503
scoring_system epss
scoring_elements 0.81171
published_at 2026-04-11T12:55:00Z
8
value 0.01503
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-12T12:55:00Z
9
value 0.01503
scoring_system epss
scoring_elements 0.81151
published_at 2026-04-13T12:55:00Z
10
value 0.01503
scoring_system epss
scoring_elements 0.81187
published_at 2026-04-21T12:55:00Z
11
value 0.01503
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-18T12:55:00Z
12
value 0.01503
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-24T12:55:00Z
13
value 0.01503
scoring_system epss
scoring_elements 0.81217
published_at 2026-04-26T12:55:00Z
14
value 0.01503
scoring_system epss
scoring_elements 0.81222
published_at 2026-04-29T12:55:00Z
15
value 0.01503
scoring_system epss
scoring_elements 0.81238
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0161
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0161
reference_id CVE-2010-0161
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0161
2
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.19
purl pkg:mozilla/SeaMonkey@1.1.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.19
aliases CVE-2010-0161
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-grm3-5qvy-aud2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.19