Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/SeaMonkey@2.0.0
Typemozilla
Namespace
NameSeaMonkey
Version2.0.0
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.0.1
Latest_non_vulnerable_version2.38.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-58z4-jhs8-kyay
vulnerability_id VCID-58z4-jhs8-kyay
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3372.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3372
reference_id
reference_type
scores
0
value 0.0177
scoring_system epss
scoring_elements 0.82685
published_at 2026-04-16T12:55:00Z
1
value 0.0177
scoring_system epss
scoring_elements 0.8258
published_at 2026-04-01T12:55:00Z
2
value 0.0177
scoring_system epss
scoring_elements 0.82595
published_at 2026-04-02T12:55:00Z
3
value 0.0177
scoring_system epss
scoring_elements 0.82611
published_at 2026-04-04T12:55:00Z
4
value 0.0177
scoring_system epss
scoring_elements 0.82607
published_at 2026-04-07T12:55:00Z
5
value 0.0177
scoring_system epss
scoring_elements 0.82633
published_at 2026-04-08T12:55:00Z
6
value 0.0177
scoring_system epss
scoring_elements 0.8264
published_at 2026-04-09T12:55:00Z
7
value 0.0177
scoring_system epss
scoring_elements 0.82658
published_at 2026-04-11T12:55:00Z
8
value 0.0177
scoring_system epss
scoring_elements 0.82652
published_at 2026-04-12T12:55:00Z
9
value 0.0177
scoring_system epss
scoring_elements 0.82647
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3372
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530155
reference_id 530155
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530155
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372
reference_id CVE-2009-3372
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-55
reference_id mfsa2009-55
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-55
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.0.0
purl pkg:mozilla/SeaMonkey@2.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.0.0
aliases CVE-2009-3372
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-58z4-jhs8-kyay
1
url VCID-5bdt-dd2k-c7gq
vulnerability_id VCID-5bdt-dd2k-c7gq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3376.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3376
reference_id
reference_type
scores
0
value 0.03024
scoring_system epss
scoring_elements 0.86638
published_at 2026-04-16T12:55:00Z
1
value 0.03024
scoring_system epss
scoring_elements 0.86561
published_at 2026-04-01T12:55:00Z
2
value 0.03024
scoring_system epss
scoring_elements 0.86572
published_at 2026-04-02T12:55:00Z
3
value 0.03024
scoring_system epss
scoring_elements 0.86591
published_at 2026-04-07T12:55:00Z
4
value 0.03024
scoring_system epss
scoring_elements 0.8661
published_at 2026-04-08T12:55:00Z
5
value 0.03024
scoring_system epss
scoring_elements 0.8662
published_at 2026-04-09T12:55:00Z
6
value 0.03024
scoring_system epss
scoring_elements 0.86634
published_at 2026-04-11T12:55:00Z
7
value 0.03024
scoring_system epss
scoring_elements 0.86632
published_at 2026-04-12T12:55:00Z
8
value 0.03024
scoring_system epss
scoring_elements 0.86625
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3376
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530168
reference_id 530168
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530168
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376
reference_id CVE-2009-3376
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-62
reference_id mfsa2009-62
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-62
6
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
7
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
8
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
9
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
10
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
11
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.0.0
purl pkg:mozilla/SeaMonkey@2.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.0.0
aliases CVE-2009-3376
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5bdt-dd2k-c7gq
2
url VCID-h68j-ht6w-jqbm
vulnerability_id VCID-h68j-ht6w-jqbm
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3373.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3373
reference_id
reference_type
scores
0
value 0.11615
scoring_system epss
scoring_elements 0.9367
published_at 2026-04-16T12:55:00Z
1
value 0.11615
scoring_system epss
scoring_elements 0.93616
published_at 2026-04-01T12:55:00Z
2
value 0.11615
scoring_system epss
scoring_elements 0.93625
published_at 2026-04-02T12:55:00Z
3
value 0.11615
scoring_system epss
scoring_elements 0.93634
published_at 2026-04-04T12:55:00Z
4
value 0.11615
scoring_system epss
scoring_elements 0.93636
published_at 2026-04-07T12:55:00Z
5
value 0.11615
scoring_system epss
scoring_elements 0.93645
published_at 2026-04-08T12:55:00Z
6
value 0.11615
scoring_system epss
scoring_elements 0.93647
published_at 2026-04-09T12:55:00Z
7
value 0.11615
scoring_system epss
scoring_elements 0.93651
published_at 2026-04-12T12:55:00Z
8
value 0.11615
scoring_system epss
scoring_elements 0.93652
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3373
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=530156
reference_id 530156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=530156
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373
reference_id CVE-2009-3373
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33313.txt
reference_id CVE-2009-3373;OSVDB-59393
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33313.txt
5
reference_url https://www.securityfocus.com/bid/36855/info
reference_id CVE-2009-3373;OSVDB-59393
reference_type exploit
scores
url https://www.securityfocus.com/bid/36855/info
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-56
reference_id mfsa2009-56
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-56
8
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
9
reference_url https://usn.ubuntu.com/853-1/
reference_id USN-853-1
reference_type
scores
url https://usn.ubuntu.com/853-1/
fixed_packages
0
url pkg:mozilla/SeaMonkey@2.0.0
purl pkg:mozilla/SeaMonkey@2.0.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.0.0
aliases CVE-2009-3373
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h68j-ht6w-jqbm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/SeaMonkey@2.0.0