Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/86648?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "type": "mozilla", "namespace": "", "name": "Firefox", "version": "9.0.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "10.0.0", "latest_non_vulnerable_version": "149.0.2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63683?format=api", "vulnerability_id": "VCID-d1s2-6yy8-effd", "summary": "FireBreath developer Richard Bateman reported a crash\non Mac OS X that occurred when a plugin deletes its containing DOM frame\nduring a call from that frame. The observed symptom is a null dereference\nbut we cannot rule out the possibility that content from a scriptable plugin\nsuch as Flash could find a way to dereference a more useful address\nand exploit it.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3664.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78537", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78459", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78465", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78479", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78506", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78511", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78536", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.7851", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01153", "scoring_system": "epss", "scoring_elements": "0.78538", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3664" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676", "reference_id": "770676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3664", "reference_id": "CVE-2011-3664", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3664" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-57", "reference_id": "mfsa2011-57", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-57" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" } ], "aliases": [ "CVE-2011-3664" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d1s2-6yy8-effd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63574?format=api", "vulnerability_id": "VCID-gbta-jxz4-rqcf", "summary": "Security researcher regenrecht reported a flaw that affected Firefox versions 4 through 8 via TippingPoint's Zero Day Initiative. This flaw is a use-after-free in nsHTMLSelectElement when the parent node of the element is no longer active and could allow for possible remote code execution.\nFirefox 3.6 is not affected by this vulnerability.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3671", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82617", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82514", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82544", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82566", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82574", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82592", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82586", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.8258", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01755", "scoring_system": "epss", "scoring_elements": "0.82616", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3671" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3671", "reference_id": "CVE-2011-3671", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3671" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-41", "reference_id": "mfsa2012-41", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2012-41" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" } ], "aliases": [ "CVE-2011-3671" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gbta-jxz4-rqcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54995?format=api", "vulnerability_id": "VCID-hzve-mm18-5uh3", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3663.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3663.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3663", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.7653", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76425", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76457", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76439", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76486", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76511", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.7649", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76526", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3663" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676", "reference_id": "770676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663", "reference_id": "CVE-2011-3663", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-56", "reference_id": "mfsa2011-56", "reference_type": "", "scores": [ { "value": "none", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-56" }, { "reference_url": "https://usn.ubuntu.com/1306-1/", "reference_id": "USN-1306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1306-1/" }, { "reference_url": "https://usn.ubuntu.com/1343-1/", "reference_id": "USN-1343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1343-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" } ], "aliases": [ "CVE-2011-3663" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzve-mm18-5uh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54988?format=api", "vulnerability_id": "VCID-se6g-prvv-qybt", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3661.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3661.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89178", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89113", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89121", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89136", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89162", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89172", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89168", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04527", "scoring_system": "epss", "scoring_elements": "0.89165", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3661" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676", "reference_id": "770676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661", "reference_id": "CVE-2011-3661", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-54", "reference_id": "mfsa2011-54", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-54" }, { "reference_url": "https://usn.ubuntu.com/1306-1/", "reference_id": "USN-1306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1306-1/" }, { "reference_url": "https://usn.ubuntu.com/1343-1/", "reference_id": "USN-1343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1343-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" } ], "aliases": [ "CVE-2011-3661" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-se6g-prvv-qybt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55000?format=api", "vulnerability_id": "VCID-uda4-3rrm-puhx", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3665.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87976", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87906", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87916", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87929", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87933", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87954", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.8796", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87963", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03707", "scoring_system": "epss", "scoring_elements": "0.87977", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3665" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676", "reference_id": "770676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3665", "reference_id": "CVE-2011-3665", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3665" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-58", "reference_id": "mfsa2011-58", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-58" }, { "reference_url": "https://usn.ubuntu.com/1306-1/", "reference_id": "USN-1306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1306-1/" }, { "reference_url": "https://usn.ubuntu.com/1343-1/", "reference_id": "USN-1343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1343-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" } ], "aliases": [ "CVE-2011-3665" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uda4-3rrm-puhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54979?format=api", "vulnerability_id": "VCID-vvud-skja-bfgz", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3660.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3660.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3660", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87968", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87992", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.87997", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03749", "scoring_system": "epss", "scoring_elements": "0.88017", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0394", "scoring_system": "epss", "scoring_elements": "0.88356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0394", "scoring_system": "epss", "scoring_elements": "0.88352", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0394", "scoring_system": "epss", "scoring_elements": "0.8834", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0394", "scoring_system": "epss", "scoring_elements": "0.88351", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0394", "scoring_system": "epss", "scoring_elements": "0.88343", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0394", "scoring_system": "epss", "scoring_elements": "0.88342", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3660" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676", "reference_id": "770676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660", "reference_id": "CVE-2011-3660", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-53", "reference_id": "mfsa2011-53", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-53" }, { "reference_url": "https://usn.ubuntu.com/1306-1/", "reference_id": "USN-1306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1306-1/" }, { "reference_url": "https://usn.ubuntu.com/1343-1/", "reference_id": "USN-1343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1343-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" } ], "aliases": [ "CVE-2011-3660" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vvud-skja-bfgz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54968?format=api", "vulnerability_id": "VCID-y216-d7mt-t7dd", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox,\n Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n allow execution of arbitrary code or local privilege escalation.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3658.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3658.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3658", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98915", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98902", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98903", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98905", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98907", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98909", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98908", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.9891", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98911", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.75876", "scoring_system": "epss", "scoring_elements": "0.98913", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3658" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676", "reference_id": "770676", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=770676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658", "reference_id": "CVE-2011-3658", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18847.rb", "reference_id": "CVE-2011-3658;OSVDB-77953", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18847.rb" }, { "reference_url": "http://www.zerodayinitiative.com/advisories/ZDI-12-056/", "reference_id": "CVE-2011-3658;OSVDB-77953", "reference_type": "exploit", "scores": [], "url": "http://www.zerodayinitiative.com/advisories/ZDI-12-056/" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-55", "reference_id": "mfsa2011-55", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2011-55" }, { "reference_url": "https://usn.ubuntu.com/1306-1/", "reference_id": "USN-1306-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1306-1/" }, { "reference_url": "https://usn.ubuntu.com/1343-1/", "reference_id": "USN-1343-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1343-1/" }, { "reference_url": "https://usn.ubuntu.com/1401-1/", "reference_id": "USN-1401-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1401-1/" }, { "reference_url": "https://usn.ubuntu.com/1401-2/", "reference_id": "USN-1401-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1401-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/86613?format=api", "purl": "pkg:mozilla/Firefox@3.6.28", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.28" }, { "url": "http://public2.vulnerablecode.io/api/packages/86648?format=api", "purl": "pkg:mozilla/Firefox@9.0.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" } ], "aliases": [ "CVE-2011-3658" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y216-d7mt-t7dd" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@9.0.0" }