Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/thunderbird@3.1.12-1?arch=el6_1
Typerpm
Namespaceredhat
Namethunderbird
Version3.1.12-1
Qualifiers
arch el6_1
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-hwkn-xzwe-jfh6
vulnerability_id VCID-hwkn-xzwe-jfh6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2982.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2982.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2982
reference_id
reference_type
scores
0
value 0.02496
scoring_system epss
scoring_elements 0.85479
published_at 2026-05-14T12:55:00Z
1
value 0.02496
scoring_system epss
scoring_elements 0.85429
published_at 2026-05-11T12:55:00Z
2
value 0.02496
scoring_system epss
scoring_elements 0.85441
published_at 2026-05-12T12:55:00Z
3
value 0.02496
scoring_system epss
scoring_elements 0.85253
published_at 2026-04-01T12:55:00Z
4
value 0.02496
scoring_system epss
scoring_elements 0.85265
published_at 2026-04-02T12:55:00Z
5
value 0.02496
scoring_system epss
scoring_elements 0.85283
published_at 2026-04-04T12:55:00Z
6
value 0.02496
scoring_system epss
scoring_elements 0.85286
published_at 2026-04-07T12:55:00Z
7
value 0.02496
scoring_system epss
scoring_elements 0.85308
published_at 2026-04-08T12:55:00Z
8
value 0.02496
scoring_system epss
scoring_elements 0.85316
published_at 2026-04-09T12:55:00Z
9
value 0.02496
scoring_system epss
scoring_elements 0.8533
published_at 2026-04-11T12:55:00Z
10
value 0.02496
scoring_system epss
scoring_elements 0.85328
published_at 2026-04-12T12:55:00Z
11
value 0.02496
scoring_system epss
scoring_elements 0.85325
published_at 2026-04-13T12:55:00Z
12
value 0.02496
scoring_system epss
scoring_elements 0.85346
published_at 2026-04-16T12:55:00Z
13
value 0.02496
scoring_system epss
scoring_elements 0.85347
published_at 2026-04-18T12:55:00Z
14
value 0.02496
scoring_system epss
scoring_elements 0.85344
published_at 2026-04-21T12:55:00Z
15
value 0.02496
scoring_system epss
scoring_elements 0.85367
published_at 2026-04-24T12:55:00Z
16
value 0.02496
scoring_system epss
scoring_elements 0.85376
published_at 2026-04-26T12:55:00Z
17
value 0.02496
scoring_system epss
scoring_elements 0.85375
published_at 2026-04-29T12:55:00Z
18
value 0.02496
scoring_system epss
scoring_elements 0.85389
published_at 2026-05-05T12:55:00Z
19
value 0.02496
scoring_system epss
scoring_elements 0.85415
published_at 2026-05-07T12:55:00Z
20
value 0.02496
scoring_system epss
scoring_elements 0.85433
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2982
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=730518
reference_id 730518
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=730518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2982
reference_id CVE-2011-2982
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2982
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-30
reference_id mfsa2011-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-30
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-32
reference_id mfsa2011-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-32
7
reference_url https://access.redhat.com/errata/RHSA-2011:1164
reference_id RHSA-2011:1164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1164
8
reference_url https://access.redhat.com/errata/RHSA-2011:1165
reference_id RHSA-2011:1165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1165
9
reference_url https://access.redhat.com/errata/RHSA-2011:1166
reference_id RHSA-2011:1166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1166
10
reference_url https://access.redhat.com/errata/RHSA-2011:1167
reference_id RHSA-2011:1167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1167
11
reference_url https://usn.ubuntu.com/1184-1/
reference_id USN-1184-1
reference_type
scores
url https://usn.ubuntu.com/1184-1/
12
reference_url https://usn.ubuntu.com/1185-1/
reference_id USN-1185-1
reference_type
scores
url https://usn.ubuntu.com/1185-1/
fixed_packages
aliases CVE-2011-2982
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hwkn-xzwe-jfh6
1
url VCID-wbgq-vd7w-bken
vulnerability_id VCID-wbgq-vd7w-bken
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2378.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2378.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2378
reference_id
reference_type
scores
0
value 0.04955
scoring_system epss
scoring_elements 0.89746
published_at 2026-05-14T12:55:00Z
1
value 0.04955
scoring_system epss
scoring_elements 0.89718
published_at 2026-05-11T12:55:00Z
2
value 0.04955
scoring_system epss
scoring_elements 0.89728
published_at 2026-05-12T12:55:00Z
3
value 0.04955
scoring_system epss
scoring_elements 0.89617
published_at 2026-04-01T12:55:00Z
4
value 0.04955
scoring_system epss
scoring_elements 0.8962
published_at 2026-04-02T12:55:00Z
5
value 0.04955
scoring_system epss
scoring_elements 0.89634
published_at 2026-04-04T12:55:00Z
6
value 0.04955
scoring_system epss
scoring_elements 0.89635
published_at 2026-04-07T12:55:00Z
7
value 0.04955
scoring_system epss
scoring_elements 0.89651
published_at 2026-04-08T12:55:00Z
8
value 0.04955
scoring_system epss
scoring_elements 0.89657
published_at 2026-04-09T12:55:00Z
9
value 0.04955
scoring_system epss
scoring_elements 0.89664
published_at 2026-04-11T12:55:00Z
10
value 0.04955
scoring_system epss
scoring_elements 0.89663
published_at 2026-04-12T12:55:00Z
11
value 0.04955
scoring_system epss
scoring_elements 0.89656
published_at 2026-04-13T12:55:00Z
12
value 0.04955
scoring_system epss
scoring_elements 0.89671
published_at 2026-04-16T12:55:00Z
13
value 0.04955
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-18T12:55:00Z
14
value 0.04955
scoring_system epss
scoring_elements 0.89666
published_at 2026-04-21T12:55:00Z
15
value 0.04955
scoring_system epss
scoring_elements 0.89681
published_at 2026-04-24T12:55:00Z
16
value 0.04955
scoring_system epss
scoring_elements 0.89683
published_at 2026-04-26T12:55:00Z
17
value 0.04955
scoring_system epss
scoring_elements 0.89682
published_at 2026-04-29T12:55:00Z
18
value 0.04955
scoring_system epss
scoring_elements 0.89694
published_at 2026-05-05T12:55:00Z
19
value 0.04955
scoring_system epss
scoring_elements 0.89711
published_at 2026-05-07T12:55:00Z
20
value 0.04955
scoring_system epss
scoring_elements 0.89723
published_at 2026-05-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2378
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=730521
reference_id 730521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=730521
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2378
reference_id CVE-2011-2378
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2378
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-30
reference_id mfsa2011-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-30
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-32
reference_id mfsa2011-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-32
7
reference_url https://access.redhat.com/errata/RHSA-2011:1164
reference_id RHSA-2011:1164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1164
8
reference_url https://access.redhat.com/errata/RHSA-2011:1166
reference_id RHSA-2011:1166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1166
9
reference_url https://usn.ubuntu.com/1184-1/
reference_id USN-1184-1
reference_type
scores
url https://usn.ubuntu.com/1184-1/
10
reference_url https://usn.ubuntu.com/1185-1/
reference_id USN-1185-1
reference_type
scores
url https://usn.ubuntu.com/1185-1/
fixed_packages
aliases CVE-2011-2378
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbgq-vd7w-bken
2
url VCID-we16-3qer-rqg6
vulnerability_id VCID-we16-3qer-rqg6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0084.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0084.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0084
reference_id
reference_type
scores
0
value 0.05475
scoring_system epss
scoring_elements 0.90284
published_at 2026-05-14T12:55:00Z
1
value 0.05475
scoring_system epss
scoring_elements 0.90239
published_at 2026-05-05T12:55:00Z
2
value 0.05475
scoring_system epss
scoring_elements 0.90255
published_at 2026-05-07T12:55:00Z
3
value 0.05475
scoring_system epss
scoring_elements 0.90266
published_at 2026-05-09T12:55:00Z
4
value 0.05475
scoring_system epss
scoring_elements 0.9026
published_at 2026-05-11T12:55:00Z
5
value 0.05475
scoring_system epss
scoring_elements 0.90269
published_at 2026-05-12T12:55:00Z
6
value 0.05475
scoring_system epss
scoring_elements 0.90158
published_at 2026-04-01T12:55:00Z
7
value 0.05475
scoring_system epss
scoring_elements 0.90161
published_at 2026-04-02T12:55:00Z
8
value 0.05475
scoring_system epss
scoring_elements 0.90173
published_at 2026-04-04T12:55:00Z
9
value 0.05475
scoring_system epss
scoring_elements 0.90178
published_at 2026-04-07T12:55:00Z
10
value 0.05475
scoring_system epss
scoring_elements 0.90194
published_at 2026-04-08T12:55:00Z
11
value 0.05475
scoring_system epss
scoring_elements 0.90199
published_at 2026-04-09T12:55:00Z
12
value 0.05475
scoring_system epss
scoring_elements 0.90208
published_at 2026-04-11T12:55:00Z
13
value 0.05475
scoring_system epss
scoring_elements 0.90207
published_at 2026-04-12T12:55:00Z
14
value 0.05475
scoring_system epss
scoring_elements 0.90202
published_at 2026-04-13T12:55:00Z
15
value 0.05475
scoring_system epss
scoring_elements 0.9022
published_at 2026-04-16T12:55:00Z
16
value 0.05475
scoring_system epss
scoring_elements 0.90221
published_at 2026-04-18T12:55:00Z
17
value 0.05475
scoring_system epss
scoring_elements 0.90217
published_at 2026-04-21T12:55:00Z
18
value 0.05475
scoring_system epss
scoring_elements 0.90231
published_at 2026-04-24T12:55:00Z
19
value 0.05475
scoring_system epss
scoring_elements 0.9023
published_at 2026-04-26T12:55:00Z
20
value 0.05475
scoring_system epss
scoring_elements 0.90227
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0084
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=730519
reference_id 730519
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=730519
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084
reference_id CVE-2011-0084
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-29
reference_id mfsa2011-29
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-29
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-30
reference_id mfsa2011-30
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-30
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-31
reference_id mfsa2011-31
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-31
8
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-32
reference_id mfsa2011-32
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-32
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2011-33
reference_id mfsa2011-33
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2011-33
10
reference_url https://access.redhat.com/errata/RHSA-2011:1164
reference_id RHSA-2011:1164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1164
11
reference_url https://access.redhat.com/errata/RHSA-2011:1166
reference_id RHSA-2011:1166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:1166
12
reference_url https://usn.ubuntu.com/1184-1/
reference_id USN-1184-1
reference_type
scores
url https://usn.ubuntu.com/1184-1/
13
reference_url https://usn.ubuntu.com/1185-1/
reference_id USN-1185-1
reference_type
scores
url https://usn.ubuntu.com/1185-1/
14
reference_url https://usn.ubuntu.com/1192-1/
reference_id USN-1192-1
reference_type
scores
url https://usn.ubuntu.com/1192-1/
fixed_packages
aliases CVE-2011-0084
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-we16-3qer-rqg6
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/thunderbird@3.1.12-1%3Farch=el6_1