Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Firefox@4.0.1
Typemozilla
Namespace
NameFirefox
Version4.0.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.0.0
Latest_non_vulnerable_version150.0.0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-8a69-3km5-nfgs
vulnerability_id VCID-8a69-3km5-nfgs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://code.google.com/p/chromium/issues/detail?id=73716
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=73716
1
reference_url http://downloads.avaya.com/css/P8/documents/100144158
reference_id
reference_type
scores
url http://downloads.avaya.com/css/P8/documents/100144158
2
reference_url http://git.gnome.org/browse/libxslt/commit/?id=ecb6bcb8d1b7e44842edde3929f412d46b40c89f
reference_id
reference_type
scores
url http://git.gnome.org/browse/libxslt/commit/?id=ecb6bcb8d1b7e44842edde3929f412d46b40c89f
3
reference_url http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2011/03/chrome-stable-release.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1202.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1202.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1202
reference_id
reference_type
scores
0
value 0.00644
scoring_system epss
scoring_elements 0.70747
published_at 2026-04-26T12:55:00Z
1
value 0.00644
scoring_system epss
scoring_elements 0.70589
published_at 2026-04-01T12:55:00Z
2
value 0.00644
scoring_system epss
scoring_elements 0.70684
published_at 2026-04-21T12:55:00Z
3
value 0.00644
scoring_system epss
scoring_elements 0.70737
published_at 2026-04-24T12:55:00Z
4
value 0.00644
scoring_system epss
scoring_elements 0.70602
published_at 2026-04-02T12:55:00Z
5
value 0.00644
scoring_system epss
scoring_elements 0.70619
published_at 2026-04-04T12:55:00Z
6
value 0.00644
scoring_system epss
scoring_elements 0.70596
published_at 2026-04-07T12:55:00Z
7
value 0.00644
scoring_system epss
scoring_elements 0.70642
published_at 2026-04-08T12:55:00Z
8
value 0.00644
scoring_system epss
scoring_elements 0.70658
published_at 2026-04-09T12:55:00Z
9
value 0.00644
scoring_system epss
scoring_elements 0.7068
published_at 2026-04-11T12:55:00Z
10
value 0.00644
scoring_system epss
scoring_elements 0.70666
published_at 2026-04-12T12:55:00Z
11
value 0.00644
scoring_system epss
scoring_elements 0.70652
published_at 2026-04-13T12:55:00Z
12
value 0.00644
scoring_system epss
scoring_elements 0.70697
published_at 2026-04-16T12:55:00Z
13
value 0.00644
scoring_system epss
scoring_elements 0.70705
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1202
6
reference_url http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html
reference_id
reference_type
scores
url http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/65966
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/65966
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14244
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14244
9
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:079
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:079
10
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:164
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:164
11
reference_url http://www.securityfocus.com/bid/46785
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/46785
12
reference_url http://www.vupen.com/english/advisories/2011/0628
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0628
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617413
reference_id 617413
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=617413
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=684386
reference_id 684386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=684386
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202
reference_id CVE-2011-1202
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1202
reference_id CVE-2011-1202
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2011-1202
19
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
20
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-18
reference_id mfsa2011-18
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-18
21
reference_url https://access.redhat.com/errata/RHSA-2011:0471
reference_id RHSA-2011:0471
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0471
22
reference_url https://access.redhat.com/errata/RHSA-2012:1265
reference_id RHSA-2012:1265
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1265
23
reference_url https://usn.ubuntu.com/1112-1/
reference_id USN-1112-1
reference_type
scores
url https://usn.ubuntu.com/1112-1/
24
reference_url https://usn.ubuntu.com/1121-1/
reference_id USN-1121-1
reference_type
scores
url https://usn.ubuntu.com/1121-1/
25
reference_url https://usn.ubuntu.com/1122-1/
reference_id USN-1122-1
reference_type
scores
url https://usn.ubuntu.com/1122-1/
26
reference_url https://usn.ubuntu.com/1122-2/
reference_id USN-1122-2
reference_type
scores
url https://usn.ubuntu.com/1122-2/
27
reference_url https://usn.ubuntu.com/1123-1/
reference_id USN-1123-1
reference_type
scores
url https://usn.ubuntu.com/1123-1/
28
reference_url https://usn.ubuntu.com/1595-1/
reference_id USN-1595-1
reference_type
scores
url https://usn.ubuntu.com/1595-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.5.19
purl pkg:mozilla/Firefox@3.5.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.19
1
url pkg:mozilla/Firefox@3.6.17
purl pkg:mozilla/Firefox@3.6.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.17
2
url pkg:mozilla/Firefox@4.0.1
purl pkg:mozilla/Firefox@4.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@4.0.1
aliases CVE-2011-1202
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8a69-3km5-nfgs
1
url VCID-afcm-vccz-93a7
vulnerability_id VCID-afcm-vccz-93a7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0079
reference_id
reference_type
scores
0
value 0.06848
scoring_system epss
scoring_elements 0.91391
published_at 2026-04-26T12:55:00Z
1
value 0.06848
scoring_system epss
scoring_elements 0.91308
published_at 2026-04-01T12:55:00Z
2
value 0.06848
scoring_system epss
scoring_elements 0.91384
published_at 2026-04-21T12:55:00Z
3
value 0.06848
scoring_system epss
scoring_elements 0.91393
published_at 2026-04-24T12:55:00Z
4
value 0.06848
scoring_system epss
scoring_elements 0.91312
published_at 2026-04-02T12:55:00Z
5
value 0.06848
scoring_system epss
scoring_elements 0.91323
published_at 2026-04-04T12:55:00Z
6
value 0.06848
scoring_system epss
scoring_elements 0.9133
published_at 2026-04-07T12:55:00Z
7
value 0.06848
scoring_system epss
scoring_elements 0.91342
published_at 2026-04-08T12:55:00Z
8
value 0.06848
scoring_system epss
scoring_elements 0.91349
published_at 2026-04-09T12:55:00Z
9
value 0.06848
scoring_system epss
scoring_elements 0.91356
published_at 2026-04-11T12:55:00Z
10
value 0.06848
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-12T12:55:00Z
11
value 0.06848
scoring_system epss
scoring_elements 0.91358
published_at 2026-04-13T12:55:00Z
12
value 0.06848
scoring_system epss
scoring_elements 0.91383
published_at 2026-04-16T12:55:00Z
13
value 0.06848
scoring_system epss
scoring_elements 0.91381
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0079
1
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=601102
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=601102
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=639343
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=639343
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=639728
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=639728
4
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=639885
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=639885
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=641388
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=641388
6
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=642717
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=642717
7
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=643649
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=643649
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14232
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14232
9
reference_url http://www.mozilla.org/security/announce/2011/mfsa2011-12.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2011/mfsa2011-12.html
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0079
reference_id CVE-2011-0079
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0079
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0079
reference_id CVE-2011-0079
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0079
25
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
26
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-12
reference_id mfsa2011-12
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-12
27
reference_url https://usn.ubuntu.com/1121-1/
reference_id USN-1121-1
reference_type
scores
url https://usn.ubuntu.com/1121-1/
fixed_packages
0
url pkg:mozilla/Firefox@3.5.19
purl pkg:mozilla/Firefox@3.5.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.19
1
url pkg:mozilla/Firefox@3.6.17
purl pkg:mozilla/Firefox@3.6.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.17
2
url pkg:mozilla/Firefox@4.0.1
purl pkg:mozilla/Firefox@4.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@4.0.1
aliases CVE-2011-0079
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-afcm-vccz-93a7
2
url VCID-kezq-ad8j-eycq
vulnerability_id VCID-kezq-ad8j-eycq
summary
Two crashes that could potentially be exploited to run malicious
code were found in the WebGL feature and fixed in Firefox 4.0.1.
In addition the WebGLES libraries could potentially be used to bypass
a security feature of recent Windows versions. The WebGL feature was
introduced in Firefox 4; older versions are not affected by these issues.Nils reported that the WebGLES libraries in the Windows
version of Firefox were compiled without ASLR protection. An attacker who
found an exploitable memory corruption flaw could then use these libraries
to bypass ASLR on Windows Vista and Windows 7, making the flaw as exploitable
on those platforms as it would be on Windows XP or other platforms.
references
0
reference_url http://code.google.com/p/chromium/issues/detail?id=78524
reference_id
reference_type
scores
url http://code.google.com/p/chromium/issues/detail?id=78524
1
reference_url http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2011/04/stable-channel-update.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-1302
reference_id
reference_type
scores
0
value 0.04725
scoring_system epss
scoring_elements 0.89427
published_at 2026-04-26T12:55:00Z
1
value 0.04725
scoring_system epss
scoring_elements 0.89349
published_at 2026-04-01T12:55:00Z
2
value 0.04725
scoring_system epss
scoring_elements 0.89405
published_at 2026-04-21T12:55:00Z
3
value 0.04725
scoring_system epss
scoring_elements 0.89423
published_at 2026-04-24T12:55:00Z
4
value 0.04725
scoring_system epss
scoring_elements 0.89354
published_at 2026-04-02T12:55:00Z
5
value 0.04725
scoring_system epss
scoring_elements 0.89366
published_at 2026-04-04T12:55:00Z
6
value 0.04725
scoring_system epss
scoring_elements 0.89368
published_at 2026-04-07T12:55:00Z
7
value 0.04725
scoring_system epss
scoring_elements 0.89385
published_at 2026-04-08T12:55:00Z
8
value 0.04725
scoring_system epss
scoring_elements 0.89389
published_at 2026-04-09T12:55:00Z
9
value 0.04725
scoring_system epss
scoring_elements 0.89397
published_at 2026-04-11T12:55:00Z
10
value 0.04725
scoring_system epss
scoring_elements 0.89394
published_at 2026-04-12T12:55:00Z
11
value 0.04725
scoring_system epss
scoring_elements 0.8939
published_at 2026-04-13T12:55:00Z
12
value 0.04725
scoring_system epss
scoring_elements 0.89406
published_at 2026-04-16T12:55:00Z
13
value 0.04725
scoring_system epss
scoring_elements 0.89407
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-1302
3
reference_url http://secunia.com/advisories/44141
reference_id
reference_type
scores
url http://secunia.com/advisories/44141
4
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66768
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66768
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14737
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14737
6
reference_url http://www.securityfocus.com/bid/47377
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47377
7
reference_url http://www.securitytracker.com/id?1025377
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1025377
8
reference_url http://www.vupen.com/english/advisories/2011/1006
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/1006
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1302
reference_id CVE-2011-1302
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1302
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-1302
reference_id CVE-2011-1302
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-1302
12
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-17
reference_id mfsa2011-17
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-17
fixed_packages
0
url pkg:mozilla/Firefox@4.0.1
purl pkg:mozilla/Firefox@4.0.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@4.0.1
aliases CVE-2011-1302
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kezq-ad8j-eycq
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@4.0.1