Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mono@4.2.1.102%2Bdfsg2-4?distro=trixie
Typedeb
Namespacedebian
Namemono
Version4.2.1.102+dfsg2-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.18.0.240+dfsg-1
Latest_non_vulnerable_version6.14.1+ds2-2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2jhf-j64s-gygy
vulnerability_id VCID-2jhf-j64s-gygy
summary
Security researcher Alin Rad Pop of Secunia
Research reported a heap-based buffer overflow in Mozilla's string to
floating point number conversion routines.  Using this vulnerability
an attacker could craft some malicious JavaScript code containing a
very long string to be converted to a floating point number which
would result in improper memory allocation and the execution of an
arbitrary memory location.  This vulnerability could thus be leveraged
by the attacker to run arbitrary code on a victim's computer.Update: The underlying flaw in the dtoa routines used
by Mozilla appears to be essentially the same as that reported against the
libc gdtoa routine by Maksymilian Arciemowicz.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
reference_id
reference_type
scores
0
value 0.4176
scoring_system epss
scoring_elements 0.97433
published_at 2026-04-21T12:55:00Z
1
value 0.4176
scoring_system epss
scoring_elements 0.97395
published_at 2026-04-01T12:55:00Z
2
value 0.4176
scoring_system epss
scoring_elements 0.97421
published_at 2026-04-13T12:55:00Z
3
value 0.4176
scoring_system epss
scoring_elements 0.97429
published_at 2026-04-16T12:55:00Z
4
value 0.4176
scoring_system epss
scoring_elements 0.97402
published_at 2026-04-02T12:55:00Z
5
value 0.4176
scoring_system epss
scoring_elements 0.97406
published_at 2026-04-04T12:55:00Z
6
value 0.4176
scoring_system epss
scoring_elements 0.97408
published_at 2026-04-07T12:55:00Z
7
value 0.4176
scoring_system epss
scoring_elements 0.97415
published_at 2026-04-08T12:55:00Z
8
value 0.4176
scoring_system epss
scoring_elements 0.97417
published_at 2026-04-09T12:55:00Z
9
value 0.4176
scoring_system epss
scoring_elements 0.97419
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0689
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=539784
reference_id 539784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=539784
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
reference_id CVE-2009-0689
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
reference_id CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10185.txt
6
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10187.txt
7
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/33363.txt
8
reference_url https://www.securityfocus.com/bid/37078/info
reference_id CVE-2009-0689;OSVDB-61186
reference_type exploit
scores
url https://www.securityfocus.com/bid/37078/info
9
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/10184.txt
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33364.txt
11
reference_url https://www.securityfocus.com/bid/37080/info
reference_id CVE-2009-0689;OSVDB-61187
reference_type exploit
scores
url https://www.securityfocus.com/bid/37080/info
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33312.txt
13
reference_url https://www.securityfocus.com/bid/36851/info
reference_id CVE-2009-0689;OSVDB-61189
reference_type exploit
scores
url https://www.securityfocus.com/bid/36851/info
14
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
reference_id CVE-2009-0689;OSVDB-62402
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/10186.txt
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/33058.txt
16
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/osx/dos/33479.c
17
reference_url https://www.securityfocus.com/bid/35510/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/35510/info
18
reference_url https://www.securityfocus.com/bid/37687/info
reference_id CVE-2009-0689;OSVDB-63639
reference_type exploit
scores
url https://www.securityfocus.com/bid/37687/info
19
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33480.txt
20
reference_url https://www.securityfocus.com/bid/37688/info
reference_id CVE-2009-0689;OSVDB-63641
reference_type exploit
scores
url https://www.securityfocus.com/bid/37688/info
21
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
reference_id mfsa2009-59
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-59
22
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
reference_id OSVDB-61189;CVE-2009-0689
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/10380.pl
23
reference_url https://access.redhat.com/errata/RHSA-2009:1530
reference_id RHSA-2009:1530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1530
24
reference_url https://access.redhat.com/errata/RHSA-2009:1531
reference_id RHSA-2009:1531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1531
25
reference_url https://access.redhat.com/errata/RHSA-2009:1601
reference_id RHSA-2009:1601
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1601
26
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
27
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
28
reference_url https://access.redhat.com/errata/RHSA-2014:0311
reference_id RHSA-2014:0311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0311
29
reference_url https://access.redhat.com/errata/RHSA-2014:0312
reference_id RHSA-2014:0312
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0312
30
reference_url https://usn.ubuntu.com/871-1/
reference_id USN-871-1
reference_type
scores
url https://usn.ubuntu.com/871-1/
31
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
0
url pkg:deb/debian/mono@4.2.1.102%2Bdfsg2-4?distro=trixie
purl pkg:deb/debian/mono@4.2.1.102%2Bdfsg2-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mono@4.2.1.102%252Bdfsg2-4%3Fdistro=trixie
1
url pkg:deb/debian/mono@6.8.0.105%2Bdfsg-3.3~deb11u1?distro=trixie
purl pkg:deb/debian/mono@6.8.0.105%2Bdfsg-3.3~deb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mono@6.8.0.105%252Bdfsg-3.3~deb11u1%3Fdistro=trixie
2
url pkg:deb/debian/mono@6.8.0.105%2Bdfsg-3.3%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/mono@6.8.0.105%2Bdfsg-3.3%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mono@6.8.0.105%252Bdfsg-3.3%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/mono@6.12.0.199%2Bdfsg-6?distro=trixie
purl pkg:deb/debian/mono@6.12.0.199%2Bdfsg-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mono@6.12.0.199%252Bdfsg-6%3Fdistro=trixie
4
url pkg:deb/debian/mono@6.14.1%2Bds2-2?distro=trixie
purl pkg:deb/debian/mono@6.14.1%2Bds2-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mono@6.14.1%252Bds2-2%3Fdistro=trixie
aliases CVE-2009-0689
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2jhf-j64s-gygy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mono@4.2.1.102%252Bdfsg2-4%3Fdistro=trixie