Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Firefox@3.0.9
Typemozilla
Namespace
NameFirefox
Version3.0.9
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.10
Latest_non_vulnerable_version150.0.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-47pj-sw4a-wueh
vulnerability_id VCID-47pj-sw4a-wueh
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1310.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1310.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1310
reference_id
reference_type
scores
0
value 0.0086
scoring_system epss
scoring_elements 0.75112
published_at 2026-04-29T12:55:00Z
1
value 0.0086
scoring_system epss
scoring_elements 0.74986
published_at 2026-04-01T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.74989
published_at 2026-04-02T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.75018
published_at 2026-04-04T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.74994
published_at 2026-04-07T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75028
published_at 2026-04-08T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-09T12:55:00Z
7
value 0.0086
scoring_system epss
scoring_elements 0.75062
published_at 2026-04-11T12:55:00Z
8
value 0.0086
scoring_system epss
scoring_elements 0.75041
published_at 2026-04-12T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.7503
published_at 2026-04-13T12:55:00Z
10
value 0.0086
scoring_system epss
scoring_elements 0.75068
published_at 2026-04-16T12:55:00Z
11
value 0.0086
scoring_system epss
scoring_elements 0.75075
published_at 2026-04-18T12:55:00Z
12
value 0.0086
scoring_system epss
scoring_elements 0.75065
published_at 2026-04-21T12:55:00Z
13
value 0.0086
scoring_system epss
scoring_elements 0.75103
published_at 2026-04-24T12:55:00Z
14
value 0.0086
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1310
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496270
reference_id 496270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496270
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310
reference_id CVE-2009-1310
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-20
reference_id mfsa2009-20
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-20
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1310
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-47pj-sw4a-wueh
1
url VCID-b7zf-d56n-ekek
vulnerability_id VCID-b7zf-d56n-ekek
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1308.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1308
reference_id
reference_type
scores
0
value 0.01099
scoring_system epss
scoring_elements 0.78116
published_at 2026-04-29T12:55:00Z
1
value 0.01099
scoring_system epss
scoring_elements 0.77978
published_at 2026-04-01T12:55:00Z
2
value 0.01099
scoring_system epss
scoring_elements 0.77986
published_at 2026-04-02T12:55:00Z
3
value 0.01099
scoring_system epss
scoring_elements 0.78015
published_at 2026-04-04T12:55:00Z
4
value 0.01099
scoring_system epss
scoring_elements 0.77998
published_at 2026-04-07T12:55:00Z
5
value 0.01099
scoring_system epss
scoring_elements 0.78024
published_at 2026-04-08T12:55:00Z
6
value 0.01099
scoring_system epss
scoring_elements 0.78028
published_at 2026-04-09T12:55:00Z
7
value 0.01099
scoring_system epss
scoring_elements 0.78055
published_at 2026-04-11T12:55:00Z
8
value 0.01099
scoring_system epss
scoring_elements 0.78037
published_at 2026-04-12T12:55:00Z
9
value 0.01099
scoring_system epss
scoring_elements 0.78035
published_at 2026-04-13T12:55:00Z
10
value 0.01099
scoring_system epss
scoring_elements 0.78071
published_at 2026-04-16T12:55:00Z
11
value 0.01099
scoring_system epss
scoring_elements 0.78069
published_at 2026-04-18T12:55:00Z
12
value 0.01099
scoring_system epss
scoring_elements 0.78062
published_at 2026-04-21T12:55:00Z
13
value 0.01099
scoring_system epss
scoring_elements 0.78096
published_at 2026-04-24T12:55:00Z
14
value 0.01099
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1308
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496266
reference_id 496266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496266
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308
reference_id CVE-2009-1308
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-18
reference_id mfsa2009-18
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-18
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
8
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
9
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1308
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b7zf-d56n-ekek
2
url VCID-bfqj-npmp-auek
vulnerability_id VCID-bfqj-npmp-auek
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html
reference_id
reference_type
scores
url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html
1
reference_url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html
reference_id
reference_type
scores
url http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
3
reference_url http://rhn.redhat.com/errata/RHSA-2009-0437.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2009-0437.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0652.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0652.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0652
reference_id
reference_type
scores
0
value 0.02133
scoring_system epss
scoring_elements 0.84248
published_at 2026-04-29T12:55:00Z
1
value 0.02133
scoring_system epss
scoring_elements 0.84115
published_at 2026-04-01T12:55:00Z
2
value 0.02133
scoring_system epss
scoring_elements 0.84235
published_at 2026-04-24T12:55:00Z
3
value 0.02133
scoring_system epss
scoring_elements 0.84242
published_at 2026-04-26T12:55:00Z
4
value 0.02133
scoring_system epss
scoring_elements 0.84128
published_at 2026-04-02T12:55:00Z
5
value 0.02133
scoring_system epss
scoring_elements 0.84146
published_at 2026-04-04T12:55:00Z
6
value 0.02133
scoring_system epss
scoring_elements 0.84148
published_at 2026-04-07T12:55:00Z
7
value 0.02133
scoring_system epss
scoring_elements 0.8417
published_at 2026-04-08T12:55:00Z
8
value 0.02133
scoring_system epss
scoring_elements 0.84176
published_at 2026-04-09T12:55:00Z
9
value 0.02133
scoring_system epss
scoring_elements 0.84194
published_at 2026-04-11T12:55:00Z
10
value 0.02133
scoring_system epss
scoring_elements 0.84188
published_at 2026-04-12T12:55:00Z
11
value 0.02133
scoring_system epss
scoring_elements 0.84185
published_at 2026-04-13T12:55:00Z
12
value 0.02133
scoring_system epss
scoring_elements 0.84206
published_at 2026-04-16T12:55:00Z
13
value 0.02133
scoring_system epss
scoring_elements 0.84207
published_at 2026-04-18T12:55:00Z
14
value 0.02133
scoring_system epss
scoring_elements 0.8421
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0652
6
reference_url http://secunia.com/advisories/34096
reference_id
reference_type
scores
url http://secunia.com/advisories/34096
7
reference_url http://secunia.com/advisories/34843
reference_id
reference_type
scores
url http://secunia.com/advisories/34843
8
reference_url http://secunia.com/advisories/34844
reference_id
reference_type
scores
url http://secunia.com/advisories/34844
9
reference_url http://secunia.com/advisories/34894
reference_id
reference_type
scores
url http://secunia.com/advisories/34894
10
reference_url http://secunia.com/advisories/35042
reference_id
reference_type
scores
url http://secunia.com/advisories/35042
11
reference_url http://secunia.com/advisories/35065
reference_id
reference_type
scores
url http://secunia.com/advisories/35065
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48974
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48974
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11396
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11396
14
reference_url https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
reference_id
reference_type
scores
url https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
15
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html
16
reference_url http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike
reference_id
reference_type
scores
url http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike
17
reference_url http://www.debian.org/security/2009/dsa-1797
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1797
18
reference_url http://www.debian.org/security/2009/dsa-1830
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1830
19
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:111
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:111
20
reference_url http://www.mozilla.org/security/announce/2009/mfsa2009-15.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2009/mfsa2009-15.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2009-0436.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0436.html
22
reference_url http://www.securityfocus.com/bid/33837
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33837
23
reference_url http://www.vupen.com/english/advisories/2009/1125
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1125
24
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=486704
reference_id 486704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=486704
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.10:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.11:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.12:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.18:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.19:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.20:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652
reference_id CVE-2009-0652
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652
114
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0652
reference_id CVE-2009-0652
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0652
115
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
116
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-15
reference_id mfsa2009-15
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-15
117
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
118
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
119
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-0652
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfqj-npmp-auek
3
url VCID-j3ev-79tv-6ybf
vulnerability_id VCID-j3ev-79tv-6ybf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1307
reference_id
reference_type
scores
0
value 0.01373
scoring_system epss
scoring_elements 0.80319
published_at 2026-04-29T12:55:00Z
1
value 0.01373
scoring_system epss
scoring_elements 0.80182
published_at 2026-04-01T12:55:00Z
2
value 0.01373
scoring_system epss
scoring_elements 0.80189
published_at 2026-04-02T12:55:00Z
3
value 0.01373
scoring_system epss
scoring_elements 0.80209
published_at 2026-04-04T12:55:00Z
4
value 0.01373
scoring_system epss
scoring_elements 0.80198
published_at 2026-04-07T12:55:00Z
5
value 0.01373
scoring_system epss
scoring_elements 0.80227
published_at 2026-04-08T12:55:00Z
6
value 0.01373
scoring_system epss
scoring_elements 0.80237
published_at 2026-04-09T12:55:00Z
7
value 0.01373
scoring_system epss
scoring_elements 0.80255
published_at 2026-04-11T12:55:00Z
8
value 0.01373
scoring_system epss
scoring_elements 0.8024
published_at 2026-04-12T12:55:00Z
9
value 0.01373
scoring_system epss
scoring_elements 0.80234
published_at 2026-04-13T12:55:00Z
10
value 0.01373
scoring_system epss
scoring_elements 0.80264
published_at 2026-04-16T12:55:00Z
11
value 0.01373
scoring_system epss
scoring_elements 0.80266
published_at 2026-04-18T12:55:00Z
12
value 0.01373
scoring_system epss
scoring_elements 0.8027
published_at 2026-04-21T12:55:00Z
13
value 0.01373
scoring_system epss
scoring_elements 0.80296
published_at 2026-04-24T12:55:00Z
14
value 0.01373
scoring_system epss
scoring_elements 0.80302
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1307
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496263
reference_id 496263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496263
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307
reference_id CVE-2009-1307
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-17
reference_id mfsa2009-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-17
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1307
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j3ev-79tv-6ybf
4
url VCID-k9rr-wea1-v3f7
vulnerability_id VCID-k9rr-wea1-v3f7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1309.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1309
reference_id
reference_type
scores
0
value 0.01757
scoring_system epss
scoring_elements 0.82668
published_at 2026-04-29T12:55:00Z
1
value 0.01757
scoring_system epss
scoring_elements 0.82526
published_at 2026-04-01T12:55:00Z
2
value 0.01757
scoring_system epss
scoring_elements 0.8254
published_at 2026-04-02T12:55:00Z
3
value 0.01757
scoring_system epss
scoring_elements 0.82555
published_at 2026-04-04T12:55:00Z
4
value 0.01757
scoring_system epss
scoring_elements 0.82551
published_at 2026-04-07T12:55:00Z
5
value 0.01757
scoring_system epss
scoring_elements 0.82577
published_at 2026-04-08T12:55:00Z
6
value 0.01757
scoring_system epss
scoring_elements 0.82585
published_at 2026-04-09T12:55:00Z
7
value 0.01757
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-11T12:55:00Z
8
value 0.01757
scoring_system epss
scoring_elements 0.82597
published_at 2026-04-12T12:55:00Z
9
value 0.01757
scoring_system epss
scoring_elements 0.8259
published_at 2026-04-13T12:55:00Z
10
value 0.01757
scoring_system epss
scoring_elements 0.82627
published_at 2026-04-18T12:55:00Z
11
value 0.01757
scoring_system epss
scoring_elements 0.82631
published_at 2026-04-21T12:55:00Z
12
value 0.01757
scoring_system epss
scoring_elements 0.82652
published_at 2026-04-24T12:55:00Z
13
value 0.01757
scoring_system epss
scoring_elements 0.82662
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1309
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496267
reference_id 496267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496267
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309
reference_id CVE-2009-1309
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-19
reference_id mfsa2009-19
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-19
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1309
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9rr-wea1-v3f7
5
url VCID-tvr2-ecx3-d3gq
vulnerability_id VCID-tvr2-ecx3-d3gq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1312.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1312
reference_id
reference_type
scores
0
value 0.05662
scoring_system epss
scoring_elements 0.90399
published_at 2026-04-29T12:55:00Z
1
value 0.05662
scoring_system epss
scoring_elements 0.90336
published_at 2026-04-01T12:55:00Z
2
value 0.05662
scoring_system epss
scoring_elements 0.90339
published_at 2026-04-02T12:55:00Z
3
value 0.05662
scoring_system epss
scoring_elements 0.9035
published_at 2026-04-04T12:55:00Z
4
value 0.05662
scoring_system epss
scoring_elements 0.90354
published_at 2026-04-07T12:55:00Z
5
value 0.05662
scoring_system epss
scoring_elements 0.90368
published_at 2026-04-08T12:55:00Z
6
value 0.05662
scoring_system epss
scoring_elements 0.90375
published_at 2026-04-09T12:55:00Z
7
value 0.05662
scoring_system epss
scoring_elements 0.90382
published_at 2026-04-12T12:55:00Z
8
value 0.05662
scoring_system epss
scoring_elements 0.90376
published_at 2026-04-13T12:55:00Z
9
value 0.05662
scoring_system epss
scoring_elements 0.90391
published_at 2026-04-18T12:55:00Z
10
value 0.05662
scoring_system epss
scoring_elements 0.90388
published_at 2026-04-21T12:55:00Z
11
value 0.05662
scoring_system epss
scoring_elements 0.90403
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1312
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496274
reference_id 496274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496274
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312
reference_id CVE-2009-1312
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32942.txt
reference_id CVE-2009-1312;OSVDB-53952
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/32942.txt
5
reference_url https://www.securityfocus.com/bid/34656/info
reference_id CVE-2009-1312;OSVDB-53952
reference_type exploit
scores
url https://www.securityfocus.com/bid/34656/info
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-22
reference_id mfsa2009-22
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-22
8
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
9
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1312
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvr2-ecx3-d3gq
6
url VCID-u3bz-getz-jub6
vulnerability_id VCID-u3bz-getz-jub6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1311
reference_id
reference_type
scores
0
value 0.01175
scoring_system epss
scoring_elements 0.78781
published_at 2026-04-29T12:55:00Z
1
value 0.01175
scoring_system epss
scoring_elements 0.78655
published_at 2026-04-01T12:55:00Z
2
value 0.01175
scoring_system epss
scoring_elements 0.78661
published_at 2026-04-02T12:55:00Z
3
value 0.01175
scoring_system epss
scoring_elements 0.78692
published_at 2026-04-04T12:55:00Z
4
value 0.01175
scoring_system epss
scoring_elements 0.78673
published_at 2026-04-07T12:55:00Z
5
value 0.01175
scoring_system epss
scoring_elements 0.78699
published_at 2026-04-08T12:55:00Z
6
value 0.01175
scoring_system epss
scoring_elements 0.78706
published_at 2026-04-09T12:55:00Z
7
value 0.01175
scoring_system epss
scoring_elements 0.78731
published_at 2026-04-11T12:55:00Z
8
value 0.01175
scoring_system epss
scoring_elements 0.78713
published_at 2026-04-12T12:55:00Z
9
value 0.01175
scoring_system epss
scoring_elements 0.78705
published_at 2026-04-13T12:55:00Z
10
value 0.01175
scoring_system epss
scoring_elements 0.78734
published_at 2026-04-16T12:55:00Z
11
value 0.01175
scoring_system epss
scoring_elements 0.78732
published_at 2026-04-18T12:55:00Z
12
value 0.01175
scoring_system epss
scoring_elements 0.78728
published_at 2026-04-21T12:55:00Z
13
value 0.01175
scoring_system epss
scoring_elements 0.78757
published_at 2026-04-24T12:55:00Z
14
value 0.01175
scoring_system epss
scoring_elements 0.78764
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1311
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496271
reference_id 496271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496271
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311
reference_id CVE-2009-1311
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-21
reference_id mfsa2009-21
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-21
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1311
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3bz-getz-jub6
7
url VCID-vd5h-d9n3-pfbx
vulnerability_id VCID-vd5h-d9n3-pfbx
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1302.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1302.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1302
reference_id
reference_type
scores
0
value 0.04391
scoring_system epss
scoring_elements 0.89031
published_at 2026-04-29T12:55:00Z
1
value 0.04391
scoring_system epss
scoring_elements 0.88941
published_at 2026-04-01T12:55:00Z
2
value 0.04391
scoring_system epss
scoring_elements 0.88949
published_at 2026-04-02T12:55:00Z
3
value 0.04391
scoring_system epss
scoring_elements 0.88965
published_at 2026-04-04T12:55:00Z
4
value 0.04391
scoring_system epss
scoring_elements 0.88968
published_at 2026-04-07T12:55:00Z
5
value 0.04391
scoring_system epss
scoring_elements 0.88986
published_at 2026-04-08T12:55:00Z
6
value 0.04391
scoring_system epss
scoring_elements 0.88991
published_at 2026-04-09T12:55:00Z
7
value 0.04391
scoring_system epss
scoring_elements 0.89003
published_at 2026-04-21T12:55:00Z
8
value 0.04391
scoring_system epss
scoring_elements 0.88998
published_at 2026-04-12T12:55:00Z
9
value 0.04391
scoring_system epss
scoring_elements 0.88996
published_at 2026-04-13T12:55:00Z
10
value 0.04391
scoring_system epss
scoring_elements 0.8901
published_at 2026-04-16T12:55:00Z
11
value 0.04391
scoring_system epss
scoring_elements 0.89008
published_at 2026-04-18T12:55:00Z
12
value 0.04391
scoring_system epss
scoring_elements 0.8902
published_at 2026-04-24T12:55:00Z
13
value 0.04391
scoring_system epss
scoring_elements 0.89028
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1302
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496252
reference_id 496252
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496252
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302
reference_id CVE-2009-1302
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
reference_id mfsa2009-14
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-14
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1302
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vd5h-d9n3-pfbx
8
url VCID-vx2r-t51d-73h5
vulnerability_id VCID-vx2r-t51d-73h5
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1306.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1306.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1306
reference_id
reference_type
scores
0
value 0.01841
scoring_system epss
scoring_elements 0.83036
published_at 2026-04-29T12:55:00Z
1
value 0.01841
scoring_system epss
scoring_elements 0.82893
published_at 2026-04-01T12:55:00Z
2
value 0.01841
scoring_system epss
scoring_elements 0.82909
published_at 2026-04-02T12:55:00Z
3
value 0.01841
scoring_system epss
scoring_elements 0.82922
published_at 2026-04-04T12:55:00Z
4
value 0.01841
scoring_system epss
scoring_elements 0.82918
published_at 2026-04-07T12:55:00Z
5
value 0.01841
scoring_system epss
scoring_elements 0.82943
published_at 2026-04-08T12:55:00Z
6
value 0.01841
scoring_system epss
scoring_elements 0.8295
published_at 2026-04-09T12:55:00Z
7
value 0.01841
scoring_system epss
scoring_elements 0.82966
published_at 2026-04-11T12:55:00Z
8
value 0.01841
scoring_system epss
scoring_elements 0.82961
published_at 2026-04-12T12:55:00Z
9
value 0.01841
scoring_system epss
scoring_elements 0.82957
published_at 2026-04-13T12:55:00Z
10
value 0.01841
scoring_system epss
scoring_elements 0.82995
published_at 2026-04-18T12:55:00Z
11
value 0.01841
scoring_system epss
scoring_elements 0.82999
published_at 2026-04-21T12:55:00Z
12
value 0.01841
scoring_system epss
scoring_elements 0.83022
published_at 2026-04-24T12:55:00Z
13
value 0.01841
scoring_system epss
scoring_elements 0.8303
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1306
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496262
reference_id 496262
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496262
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306
reference_id CVE-2009-1306
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-16
reference_id mfsa2009-16
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-16
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.0.9
purl pkg:mozilla/Firefox@3.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9
aliases CVE-2009-1306
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vx2r-t51d-73h5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.9