Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@1.1.17
Typemozilla
Namespace
NameSeaMonkey
Version1.1.17
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.1.18
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-44gu-7x3j-hydk
vulnerability_id VCID-44gu-7x3j-hydk
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1836.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1836
reference_id
reference_type
scores
0
value 0.02032
scoring_system epss
scoring_elements 0.83838
published_at 2026-04-21T12:55:00Z
1
value 0.02032
scoring_system epss
scoring_elements 0.83738
published_at 2026-04-01T12:55:00Z
2
value 0.02032
scoring_system epss
scoring_elements 0.83751
published_at 2026-04-02T12:55:00Z
3
value 0.02032
scoring_system epss
scoring_elements 0.83766
published_at 2026-04-04T12:55:00Z
4
value 0.02032
scoring_system epss
scoring_elements 0.83768
published_at 2026-04-07T12:55:00Z
5
value 0.02032
scoring_system epss
scoring_elements 0.83792
published_at 2026-04-08T12:55:00Z
6
value 0.02032
scoring_system epss
scoring_elements 0.83799
published_at 2026-04-09T12:55:00Z
7
value 0.02032
scoring_system epss
scoring_elements 0.83814
published_at 2026-04-11T12:55:00Z
8
value 0.02032
scoring_system epss
scoring_elements 0.83808
published_at 2026-04-12T12:55:00Z
9
value 0.02032
scoring_system epss
scoring_elements 0.83804
published_at 2026-04-13T12:55:00Z
10
value 0.02032
scoring_system epss
scoring_elements 0.83837
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1836
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=503578
reference_id 503578
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=503578
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836
reference_id CVE-2009-1836
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1836
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-27
reference_id mfsa2009-27
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-27
6
reference_url https://access.redhat.com/errata/RHSA-2009:1095
reference_id RHSA-2009:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1095
7
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
8
reference_url https://usn.ubuntu.com/779-1/
reference_id USN-779-1
reference_type
scores
url https://usn.ubuntu.com/779-1/
9
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.17
purl pkg:mozilla/SeaMonkey@1.1.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17
aliases CVE-2009-1836
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44gu-7x3j-hydk
1
url VCID-9qwt-b4rw-1bgp
vulnerability_id VCID-9qwt-b4rw-1bgp
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1841.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1841.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1841
reference_id
reference_type
scores
0
value 0.04241
scoring_system epss
scoring_elements 0.88799
published_at 2026-04-21T12:55:00Z
1
value 0.04241
scoring_system epss
scoring_elements 0.88732
published_at 2026-04-01T12:55:00Z
2
value 0.04241
scoring_system epss
scoring_elements 0.88741
published_at 2026-04-02T12:55:00Z
3
value 0.04241
scoring_system epss
scoring_elements 0.88758
published_at 2026-04-04T12:55:00Z
4
value 0.04241
scoring_system epss
scoring_elements 0.8876
published_at 2026-04-07T12:55:00Z
5
value 0.04241
scoring_system epss
scoring_elements 0.88777
published_at 2026-04-08T12:55:00Z
6
value 0.04241
scoring_system epss
scoring_elements 0.88782
published_at 2026-04-09T12:55:00Z
7
value 0.04241
scoring_system epss
scoring_elements 0.88794
published_at 2026-04-11T12:55:00Z
8
value 0.04241
scoring_system epss
scoring_elements 0.88789
published_at 2026-04-13T12:55:00Z
9
value 0.04241
scoring_system epss
scoring_elements 0.88803
published_at 2026-04-16T12:55:00Z
10
value 0.04241
scoring_system epss
scoring_elements 0.88801
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1841
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=503583
reference_id 503583
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=503583
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841
reference_id CVE-2009-1841
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-32
reference_id mfsa2009-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-32
6
reference_url https://access.redhat.com/errata/RHSA-2009:1095
reference_id RHSA-2009:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1095
7
reference_url https://access.redhat.com/errata/RHSA-2009:1096
reference_id RHSA-2009:1096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1096
8
reference_url https://usn.ubuntu.com/779-1/
reference_id USN-779-1
reference_type
scores
url https://usn.ubuntu.com/779-1/
9
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.17
purl pkg:mozilla/SeaMonkey@1.1.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17
aliases CVE-2009-1841
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9qwt-b4rw-1bgp
2
url VCID-j3ev-79tv-6ybf
vulnerability_id VCID-j3ev-79tv-6ybf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1307.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1307
reference_id
reference_type
scores
0
value 0.01373
scoring_system epss
scoring_elements 0.8027
published_at 2026-04-21T12:55:00Z
1
value 0.01373
scoring_system epss
scoring_elements 0.80182
published_at 2026-04-01T12:55:00Z
2
value 0.01373
scoring_system epss
scoring_elements 0.80189
published_at 2026-04-02T12:55:00Z
3
value 0.01373
scoring_system epss
scoring_elements 0.80209
published_at 2026-04-04T12:55:00Z
4
value 0.01373
scoring_system epss
scoring_elements 0.80198
published_at 2026-04-07T12:55:00Z
5
value 0.01373
scoring_system epss
scoring_elements 0.80227
published_at 2026-04-08T12:55:00Z
6
value 0.01373
scoring_system epss
scoring_elements 0.80237
published_at 2026-04-09T12:55:00Z
7
value 0.01373
scoring_system epss
scoring_elements 0.80255
published_at 2026-04-11T12:55:00Z
8
value 0.01373
scoring_system epss
scoring_elements 0.8024
published_at 2026-04-12T12:55:00Z
9
value 0.01373
scoring_system epss
scoring_elements 0.80234
published_at 2026-04-13T12:55:00Z
10
value 0.01373
scoring_system epss
scoring_elements 0.80264
published_at 2026-04-16T12:55:00Z
11
value 0.01373
scoring_system epss
scoring_elements 0.80266
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1307
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496263
reference_id 496263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496263
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307
reference_id CVE-2009-1307
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-17
reference_id mfsa2009-17
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-17
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.17
purl pkg:mozilla/SeaMonkey@1.1.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17
aliases CVE-2009-1307
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j3ev-79tv-6ybf
3
url VCID-k3ye-858q-x3ew
vulnerability_id VCID-k3ye-858q-x3ew
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1835.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1835
reference_id
reference_type
scores
0
value 0.01548
scoring_system epss
scoring_elements 0.81443
published_at 2026-04-21T12:55:00Z
1
value 0.01548
scoring_system epss
scoring_elements 0.8134
published_at 2026-04-01T12:55:00Z
2
value 0.01548
scoring_system epss
scoring_elements 0.81349
published_at 2026-04-02T12:55:00Z
3
value 0.01548
scoring_system epss
scoring_elements 0.81371
published_at 2026-04-04T12:55:00Z
4
value 0.01548
scoring_system epss
scoring_elements 0.81369
published_at 2026-04-07T12:55:00Z
5
value 0.01548
scoring_system epss
scoring_elements 0.81397
published_at 2026-04-08T12:55:00Z
6
value 0.01548
scoring_system epss
scoring_elements 0.81402
published_at 2026-04-09T12:55:00Z
7
value 0.01548
scoring_system epss
scoring_elements 0.81423
published_at 2026-04-11T12:55:00Z
8
value 0.01548
scoring_system epss
scoring_elements 0.81411
published_at 2026-04-12T12:55:00Z
9
value 0.01548
scoring_system epss
scoring_elements 0.81404
published_at 2026-04-13T12:55:00Z
10
value 0.01548
scoring_system epss
scoring_elements 0.81441
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1835
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=503576
reference_id 503576
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=503576
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835
reference_id CVE-2009-1835
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-26
reference_id mfsa2009-26
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-26
6
reference_url https://access.redhat.com/errata/RHSA-2009:1095
reference_id RHSA-2009:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1095
7
reference_url https://access.redhat.com/errata/RHSA-2009:1096
reference_id RHSA-2009:1096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1096
8
reference_url https://usn.ubuntu.com/779-1/
reference_id USN-779-1
reference_type
scores
url https://usn.ubuntu.com/779-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.17
purl pkg:mozilla/SeaMonkey@1.1.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17
aliases CVE-2009-1835
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ye-858q-x3ew
4
url VCID-r4x1-akj3-b3hr
vulnerability_id VCID-r4x1-akj3-b3hr
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1838.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1838.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1838
reference_id
reference_type
scores
0
value 0.04629
scoring_system epss
scoring_elements 0.8929
published_at 2026-04-18T12:55:00Z
1
value 0.04629
scoring_system epss
scoring_elements 0.89231
published_at 2026-04-01T12:55:00Z
2
value 0.04629
scoring_system epss
scoring_elements 0.89237
published_at 2026-04-02T12:55:00Z
3
value 0.04629
scoring_system epss
scoring_elements 0.89251
published_at 2026-04-04T12:55:00Z
4
value 0.04629
scoring_system epss
scoring_elements 0.89254
published_at 2026-04-07T12:55:00Z
5
value 0.04629
scoring_system epss
scoring_elements 0.89271
published_at 2026-04-08T12:55:00Z
6
value 0.04629
scoring_system epss
scoring_elements 0.89276
published_at 2026-04-09T12:55:00Z
7
value 0.04629
scoring_system epss
scoring_elements 0.89285
published_at 2026-04-21T12:55:00Z
8
value 0.04629
scoring_system epss
scoring_elements 0.89281
published_at 2026-04-12T12:55:00Z
9
value 0.04629
scoring_system epss
scoring_elements 0.89277
published_at 2026-04-13T12:55:00Z
10
value 0.04629
scoring_system epss
scoring_elements 0.89291
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1838
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=503580
reference_id 503580
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=503580
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838
reference_id CVE-2009-1838
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-29
reference_id mfsa2009-29
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-29
6
reference_url https://access.redhat.com/errata/RHSA-2009:1095
reference_id RHSA-2009:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1095
7
reference_url https://access.redhat.com/errata/RHSA-2009:1096
reference_id RHSA-2009:1096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1096
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/779-1/
reference_id USN-779-1
reference_type
scores
url https://usn.ubuntu.com/779-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.17
purl pkg:mozilla/SeaMonkey@1.1.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17
aliases CVE-2009-1838
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r4x1-akj3-b3hr
5
url VCID-u3bz-getz-jub6
vulnerability_id VCID-u3bz-getz-jub6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1311
reference_id
reference_type
scores
0
value 0.01175
scoring_system epss
scoring_elements 0.78728
published_at 2026-04-21T12:55:00Z
1
value 0.01175
scoring_system epss
scoring_elements 0.78655
published_at 2026-04-01T12:55:00Z
2
value 0.01175
scoring_system epss
scoring_elements 0.78661
published_at 2026-04-02T12:55:00Z
3
value 0.01175
scoring_system epss
scoring_elements 0.78692
published_at 2026-04-04T12:55:00Z
4
value 0.01175
scoring_system epss
scoring_elements 0.78673
published_at 2026-04-07T12:55:00Z
5
value 0.01175
scoring_system epss
scoring_elements 0.78699
published_at 2026-04-08T12:55:00Z
6
value 0.01175
scoring_system epss
scoring_elements 0.78706
published_at 2026-04-09T12:55:00Z
7
value 0.01175
scoring_system epss
scoring_elements 0.78731
published_at 2026-04-11T12:55:00Z
8
value 0.01175
scoring_system epss
scoring_elements 0.78713
published_at 2026-04-12T12:55:00Z
9
value 0.01175
scoring_system epss
scoring_elements 0.78705
published_at 2026-04-13T12:55:00Z
10
value 0.01175
scoring_system epss
scoring_elements 0.78734
published_at 2026-04-16T12:55:00Z
11
value 0.01175
scoring_system epss
scoring_elements 0.78732
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1311
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496271
reference_id 496271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496271
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311
reference_id CVE-2009-1311
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-21
reference_id mfsa2009-21
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-21
6
reference_url https://access.redhat.com/errata/RHSA-2009:0436
reference_id RHSA-2009:0436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0436
7
reference_url https://access.redhat.com/errata/RHSA-2009:0437
reference_id RHSA-2009:0437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0437
8
reference_url https://usn.ubuntu.com/764-1/
reference_id USN-764-1
reference_type
scores
url https://usn.ubuntu.com/764-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.17
purl pkg:mozilla/SeaMonkey@1.1.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17
aliases CVE-2009-1311
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3bz-getz-jub6
6
url VCID-y9uf-pn44-7qcj
vulnerability_id VCID-y9uf-pn44-7qcj
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1392.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1392
reference_id
reference_type
scores
0
value 0.15734
scoring_system epss
scoring_elements 0.94737
published_at 2026-04-21T12:55:00Z
1
value 0.15734
scoring_system epss
scoring_elements 0.94684
published_at 2026-04-01T12:55:00Z
2
value 0.15734
scoring_system epss
scoring_elements 0.94692
published_at 2026-04-02T12:55:00Z
3
value 0.15734
scoring_system epss
scoring_elements 0.94696
published_at 2026-04-04T12:55:00Z
4
value 0.15734
scoring_system epss
scoring_elements 0.94698
published_at 2026-04-07T12:55:00Z
5
value 0.15734
scoring_system epss
scoring_elements 0.94708
published_at 2026-04-08T12:55:00Z
6
value 0.15734
scoring_system epss
scoring_elements 0.94712
published_at 2026-04-09T12:55:00Z
7
value 0.15734
scoring_system epss
scoring_elements 0.94716
published_at 2026-04-11T12:55:00Z
8
value 0.15734
scoring_system epss
scoring_elements 0.9472
published_at 2026-04-12T12:55:00Z
9
value 0.15734
scoring_system epss
scoring_elements 0.94721
published_at 2026-04-13T12:55:00Z
10
value 0.15734
scoring_system epss
scoring_elements 0.9473
published_at 2026-04-16T12:55:00Z
11
value 0.15734
scoring_system epss
scoring_elements 0.94732
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1392
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=503568
reference_id 503568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=503568
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392
reference_id CVE-2009-1392
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-24
reference_id mfsa2009-24
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-24
6
reference_url https://access.redhat.com/errata/RHSA-2009:1095
reference_id RHSA-2009:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1095
7
reference_url https://access.redhat.com/errata/RHSA-2009:1096
reference_id RHSA-2009:1096
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1096
8
reference_url https://access.redhat.com/errata/RHSA-2009:1125
reference_id RHSA-2009:1125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1125
9
reference_url https://access.redhat.com/errata/RHSA-2009:1126
reference_id RHSA-2009:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1126
10
reference_url https://usn.ubuntu.com/779-1/
reference_id USN-779-1
reference_type
scores
url https://usn.ubuntu.com/779-1/
11
reference_url https://usn.ubuntu.com/782-1/
reference_id USN-782-1
reference_type
scores
url https://usn.ubuntu.com/782-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@1.1.17
purl pkg:mozilla/SeaMonkey@1.1.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17
aliases CVE-2009-1392
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9uf-pn44-7qcj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@1.1.17