Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/nspr@4.7.5-1?arch=el4_8
Typerpm
Namespaceredhat
Namenspr
Version4.7.5-1
Qualifiers
arch el4_8
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1bhg-rmd2-7uhe
vulnerability_id VCID-1bhg-rmd2-7uhe
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3070.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3070.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3070
reference_id
reference_type
scores
0
value 0.04029
scoring_system epss
scoring_elements 0.88529
published_at 2026-05-05T12:55:00Z
1
value 0.04029
scoring_system epss
scoring_elements 0.88435
published_at 2026-04-01T12:55:00Z
2
value 0.04029
scoring_system epss
scoring_elements 0.88443
published_at 2026-04-02T12:55:00Z
3
value 0.04029
scoring_system epss
scoring_elements 0.88458
published_at 2026-04-04T12:55:00Z
4
value 0.04029
scoring_system epss
scoring_elements 0.88461
published_at 2026-04-07T12:55:00Z
5
value 0.04029
scoring_system epss
scoring_elements 0.8848
published_at 2026-04-08T12:55:00Z
6
value 0.04029
scoring_system epss
scoring_elements 0.88486
published_at 2026-04-09T12:55:00Z
7
value 0.04029
scoring_system epss
scoring_elements 0.88497
published_at 2026-04-21T12:55:00Z
8
value 0.04029
scoring_system epss
scoring_elements 0.88489
published_at 2026-04-13T12:55:00Z
9
value 0.04029
scoring_system epss
scoring_elements 0.88503
published_at 2026-04-16T12:55:00Z
10
value 0.04029
scoring_system epss
scoring_elements 0.885
published_at 2026-04-18T12:55:00Z
11
value 0.04029
scoring_system epss
scoring_elements 0.88514
published_at 2026-04-24T12:55:00Z
12
value 0.04029
scoring_system epss
scoring_elements 0.88519
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3070
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521686
reference_id 521686
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521686
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070
reference_id CVE-2009-3070
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
reference_id mfsa2009-47
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
6
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
7
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
fixed_packages
aliases CVE-2009-3070
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1bhg-rmd2-7uhe
1
url VCID-1n9c-e6em-kbb6
vulnerability_id VCID-1n9c-e6em-kbb6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3077
reference_id
reference_type
scores
0
value 0.0543
scoring_system epss
scoring_elements 0.90204
published_at 2026-05-05T12:55:00Z
1
value 0.0543
scoring_system epss
scoring_elements 0.90124
published_at 2026-04-01T12:55:00Z
2
value 0.0543
scoring_system epss
scoring_elements 0.90127
published_at 2026-04-02T12:55:00Z
3
value 0.0543
scoring_system epss
scoring_elements 0.90139
published_at 2026-04-04T12:55:00Z
4
value 0.0543
scoring_system epss
scoring_elements 0.90143
published_at 2026-04-07T12:55:00Z
5
value 0.0543
scoring_system epss
scoring_elements 0.90159
published_at 2026-04-08T12:55:00Z
6
value 0.0543
scoring_system epss
scoring_elements 0.90165
published_at 2026-04-09T12:55:00Z
7
value 0.0543
scoring_system epss
scoring_elements 0.90173
published_at 2026-04-12T12:55:00Z
8
value 0.0543
scoring_system epss
scoring_elements 0.90167
published_at 2026-04-13T12:55:00Z
9
value 0.0543
scoring_system epss
scoring_elements 0.90185
published_at 2026-04-18T12:55:00Z
10
value 0.0543
scoring_system epss
scoring_elements 0.90181
published_at 2026-04-21T12:55:00Z
11
value 0.0543
scoring_system epss
scoring_elements 0.90196
published_at 2026-04-24T12:55:00Z
12
value 0.0543
scoring_system epss
scoring_elements 0.90195
published_at 2026-04-26T12:55:00Z
13
value 0.0543
scoring_system epss
scoring_elements 0.90193
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3077
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521693
reference_id 521693
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521693
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077
reference_id CVE-2009-3077
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-49
reference_id mfsa2009-49
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-49
6
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
7
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
8
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
9
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
10
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
11
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
12
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3077
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1n9c-e6em-kbb6
2
url VCID-3bf4-ms9e-x3dq
vulnerability_id VCID-3bf4-ms9e-x3dq
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3076
reference_id
reference_type
scores
0
value 0.17599
scoring_system epss
scoring_elements 0.95123
published_at 2026-05-05T12:55:00Z
1
value 0.17599
scoring_system epss
scoring_elements 0.95059
published_at 2026-04-01T12:55:00Z
2
value 0.17599
scoring_system epss
scoring_elements 0.95069
published_at 2026-04-02T12:55:00Z
3
value 0.17599
scoring_system epss
scoring_elements 0.9507
published_at 2026-04-04T12:55:00Z
4
value 0.17599
scoring_system epss
scoring_elements 0.95072
published_at 2026-04-07T12:55:00Z
5
value 0.17599
scoring_system epss
scoring_elements 0.95079
published_at 2026-04-08T12:55:00Z
6
value 0.17599
scoring_system epss
scoring_elements 0.95083
published_at 2026-04-09T12:55:00Z
7
value 0.17599
scoring_system epss
scoring_elements 0.95089
published_at 2026-04-11T12:55:00Z
8
value 0.17599
scoring_system epss
scoring_elements 0.9509
published_at 2026-04-12T12:55:00Z
9
value 0.17599
scoring_system epss
scoring_elements 0.95093
published_at 2026-04-13T12:55:00Z
10
value 0.17599
scoring_system epss
scoring_elements 0.95102
published_at 2026-04-16T12:55:00Z
11
value 0.17599
scoring_system epss
scoring_elements 0.95105
published_at 2026-04-18T12:55:00Z
12
value 0.17599
scoring_system epss
scoring_elements 0.95108
published_at 2026-04-24T12:55:00Z
13
value 0.17599
scoring_system epss
scoring_elements 0.95109
published_at 2026-04-26T12:55:00Z
14
value 0.17599
scoring_system epss
scoring_elements 0.9511
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3076
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521692
reference_id 521692
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521692
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076
reference_id CVE-2009-3076
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt
reference_id CVE-2009-3076;OSVDB-57977
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt
5
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-48
reference_id mfsa2009-48
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-48
7
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
8
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
9
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
10
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
11
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
12
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
fixed_packages
aliases CVE-2009-3076
risk_score 0.4
exploitability 2.0
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3bf4-ms9e-x3dq
3
url VCID-3ydc-sd86-vkgg
vulnerability_id VCID-3ydc-sd86-vkgg
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3074.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3074
reference_id
reference_type
scores
0
value 0.06345
scoring_system epss
scoring_elements 0.91039
published_at 2026-05-05T12:55:00Z
1
value 0.06345
scoring_system epss
scoring_elements 0.9094
published_at 2026-04-01T12:55:00Z
2
value 0.06345
scoring_system epss
scoring_elements 0.90945
published_at 2026-04-02T12:55:00Z
3
value 0.06345
scoring_system epss
scoring_elements 0.90954
published_at 2026-04-04T12:55:00Z
4
value 0.06345
scoring_system epss
scoring_elements 0.90964
published_at 2026-04-07T12:55:00Z
5
value 0.06345
scoring_system epss
scoring_elements 0.90975
published_at 2026-04-08T12:55:00Z
6
value 0.06345
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-09T12:55:00Z
7
value 0.06345
scoring_system epss
scoring_elements 0.90989
published_at 2026-04-13T12:55:00Z
8
value 0.06345
scoring_system epss
scoring_elements 0.9099
published_at 2026-04-12T12:55:00Z
9
value 0.06345
scoring_system epss
scoring_elements 0.91014
published_at 2026-04-16T12:55:00Z
10
value 0.06345
scoring_system epss
scoring_elements 0.91012
published_at 2026-04-18T12:55:00Z
11
value 0.06345
scoring_system epss
scoring_elements 0.91015
published_at 2026-04-21T12:55:00Z
12
value 0.06345
scoring_system epss
scoring_elements 0.91029
published_at 2026-04-24T12:55:00Z
13
value 0.06345
scoring_system epss
scoring_elements 0.91027
published_at 2026-04-26T12:55:00Z
14
value 0.06345
scoring_system epss
scoring_elements 0.91024
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3074
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521690
reference_id 521690
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521690
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074
reference_id CVE-2009-3074
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
reference_id mfsa2009-47
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
6
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
7
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
fixed_packages
aliases CVE-2009-3074
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ydc-sd86-vkgg
4
url VCID-4yz1-a716-kkh4
vulnerability_id VCID-4yz1-a716-kkh4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3071.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3071.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3071
reference_id
reference_type
scores
0
value 0.03163
scoring_system epss
scoring_elements 0.8699
published_at 2026-05-05T12:55:00Z
1
value 0.03163
scoring_system epss
scoring_elements 0.8687
published_at 2026-04-01T12:55:00Z
2
value 0.03163
scoring_system epss
scoring_elements 0.8688
published_at 2026-04-02T12:55:00Z
3
value 0.03163
scoring_system epss
scoring_elements 0.86898
published_at 2026-04-04T12:55:00Z
4
value 0.03163
scoring_system epss
scoring_elements 0.86893
published_at 2026-04-07T12:55:00Z
5
value 0.03163
scoring_system epss
scoring_elements 0.86913
published_at 2026-04-08T12:55:00Z
6
value 0.03163
scoring_system epss
scoring_elements 0.86921
published_at 2026-04-09T12:55:00Z
7
value 0.03163
scoring_system epss
scoring_elements 0.86934
published_at 2026-04-11T12:55:00Z
8
value 0.03163
scoring_system epss
scoring_elements 0.86929
published_at 2026-04-12T12:55:00Z
9
value 0.03163
scoring_system epss
scoring_elements 0.86924
published_at 2026-04-13T12:55:00Z
10
value 0.03163
scoring_system epss
scoring_elements 0.86939
published_at 2026-04-16T12:55:00Z
11
value 0.03163
scoring_system epss
scoring_elements 0.86943
published_at 2026-04-21T12:55:00Z
12
value 0.03163
scoring_system epss
scoring_elements 0.8696
published_at 2026-04-24T12:55:00Z
13
value 0.03163
scoring_system epss
scoring_elements 0.86967
published_at 2026-04-26T12:55:00Z
14
value 0.03163
scoring_system epss
scoring_elements 0.86969
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3071
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521687
reference_id 521687
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521687
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071
reference_id CVE-2009-3071
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
reference_id mfsa2009-47
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
6
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
7
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
fixed_packages
aliases CVE-2009-3071
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz1-a716-kkh4
5
url VCID-jwsm-57gb-jkb4
vulnerability_id VCID-jwsm-57gb-jkb4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3075
reference_id
reference_type
scores
0
value 0.06395
scoring_system epss
scoring_elements 0.91074
published_at 2026-05-05T12:55:00Z
1
value 0.06395
scoring_system epss
scoring_elements 0.91063
published_at 2026-04-26T12:55:00Z
2
value 0.06395
scoring_system epss
scoring_elements 0.91059
published_at 2026-04-29T12:55:00Z
3
value 0.06395
scoring_system epss
scoring_elements 0.90976
published_at 2026-04-01T12:55:00Z
4
value 0.06395
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-02T12:55:00Z
5
value 0.06395
scoring_system epss
scoring_elements 0.9099
published_at 2026-04-04T12:55:00Z
6
value 0.06395
scoring_system epss
scoring_elements 0.91001
published_at 2026-04-07T12:55:00Z
7
value 0.06395
scoring_system epss
scoring_elements 0.91013
published_at 2026-04-08T12:55:00Z
8
value 0.06395
scoring_system epss
scoring_elements 0.91018
published_at 2026-04-09T12:55:00Z
9
value 0.06395
scoring_system epss
scoring_elements 0.91027
published_at 2026-04-13T12:55:00Z
10
value 0.06395
scoring_system epss
scoring_elements 0.91051
published_at 2026-04-16T12:55:00Z
11
value 0.06395
scoring_system epss
scoring_elements 0.9105
published_at 2026-04-18T12:55:00Z
12
value 0.06395
scoring_system epss
scoring_elements 0.91052
published_at 2026-04-21T12:55:00Z
13
value 0.06395
scoring_system epss
scoring_elements 0.91065
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3075
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521691
reference_id 521691
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521691
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075
reference_id CVE-2009-3075
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
reference_id mfsa2009-47
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
7
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
8
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
9
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
10
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
11
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
12
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
13
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3075
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jwsm-57gb-jkb4
6
url VCID-q4zw-qbrc-p3bf
vulnerability_id VCID-q4zw-qbrc-p3bf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3079.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3079.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3079
reference_id
reference_type
scores
0
value 0.0151
scoring_system epss
scoring_elements 0.81283
published_at 2026-05-05T12:55:00Z
1
value 0.0151
scoring_system epss
scoring_elements 0.81133
published_at 2026-04-01T12:55:00Z
2
value 0.0151
scoring_system epss
scoring_elements 0.81141
published_at 2026-04-02T12:55:00Z
3
value 0.0151
scoring_system epss
scoring_elements 0.81165
published_at 2026-04-04T12:55:00Z
4
value 0.0151
scoring_system epss
scoring_elements 0.81163
published_at 2026-04-07T12:55:00Z
5
value 0.0151
scoring_system epss
scoring_elements 0.81191
published_at 2026-04-08T12:55:00Z
6
value 0.0151
scoring_system epss
scoring_elements 0.81197
published_at 2026-04-09T12:55:00Z
7
value 0.0151
scoring_system epss
scoring_elements 0.81217
published_at 2026-04-11T12:55:00Z
8
value 0.0151
scoring_system epss
scoring_elements 0.81203
published_at 2026-04-12T12:55:00Z
9
value 0.0151
scoring_system epss
scoring_elements 0.81195
published_at 2026-04-13T12:55:00Z
10
value 0.0151
scoring_system epss
scoring_elements 0.81233
published_at 2026-04-21T12:55:00Z
11
value 0.0151
scoring_system epss
scoring_elements 0.81234
published_at 2026-04-18T12:55:00Z
12
value 0.0151
scoring_system epss
scoring_elements 0.81255
published_at 2026-04-24T12:55:00Z
13
value 0.0151
scoring_system epss
scoring_elements 0.81262
published_at 2026-04-26T12:55:00Z
14
value 0.0151
scoring_system epss
scoring_elements 0.81268
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3079
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521695
reference_id 521695
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521695
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079
reference_id CVE-2009-3079
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-51
reference_id mfsa2009-51
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-51
6
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
7
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
fixed_packages
aliases CVE-2009-3079
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4zw-qbrc-p3bf
7
url VCID-vbtt-wzmx-f3bf
vulnerability_id VCID-vbtt-wzmx-f3bf
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2654
reference_id
reference_type
scores
0
value 0.13196
scoring_system epss
scoring_elements 0.94162
published_at 2026-05-05T12:55:00Z
1
value 0.13196
scoring_system epss
scoring_elements 0.94092
published_at 2026-04-01T12:55:00Z
2
value 0.13196
scoring_system epss
scoring_elements 0.94102
published_at 2026-04-02T12:55:00Z
3
value 0.13196
scoring_system epss
scoring_elements 0.94113
published_at 2026-04-04T12:55:00Z
4
value 0.13196
scoring_system epss
scoring_elements 0.94116
published_at 2026-04-07T12:55:00Z
5
value 0.13196
scoring_system epss
scoring_elements 0.94125
published_at 2026-04-08T12:55:00Z
6
value 0.13196
scoring_system epss
scoring_elements 0.94129
published_at 2026-04-09T12:55:00Z
7
value 0.13196
scoring_system epss
scoring_elements 0.94134
published_at 2026-04-13T12:55:00Z
8
value 0.13196
scoring_system epss
scoring_elements 0.94133
published_at 2026-04-12T12:55:00Z
9
value 0.13196
scoring_system epss
scoring_elements 0.9415
published_at 2026-04-16T12:55:00Z
10
value 0.13196
scoring_system epss
scoring_elements 0.94155
published_at 2026-04-21T12:55:00Z
11
value 0.13196
scoring_system epss
scoring_elements 0.94157
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2654
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521311
reference_id 521311
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521311
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654
reference_id CVE-2009-2654
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html
reference_id CVE-2009-2654;OSVDB-56717
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html
5
reference_url https://www.securityfocus.com/bid/35803/info
reference_id CVE-2009-2654;OSVDB-56717
reference_type exploit
scores
url https://www.securityfocus.com/bid/35803/info
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-44
reference_id mfsa2009-44
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-44
8
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
9
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
10
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
11
reference_url https://usn.ubuntu.com/811-1/
reference_id USN-811-1
reference_type
scores
url https://usn.ubuntu.com/811-1/
fixed_packages
aliases CVE-2009-2654
risk_score 0.2
exploitability 2.0
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbtt-wzmx-f3bf
8
url VCID-wqza-9p8v-4kek
vulnerability_id VCID-wqza-9p8v-4kek
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3072
reference_id
reference_type
scores
0
value 0.04749
scoring_system epss
scoring_elements 0.89473
published_at 2026-05-05T12:55:00Z
1
value 0.04749
scoring_system epss
scoring_elements 0.89464
published_at 2026-04-26T12:55:00Z
2
value 0.04749
scoring_system epss
scoring_elements 0.89466
published_at 2026-04-29T12:55:00Z
3
value 0.04749
scoring_system epss
scoring_elements 0.89392
published_at 2026-04-01T12:55:00Z
4
value 0.04749
scoring_system epss
scoring_elements 0.89396
published_at 2026-04-02T12:55:00Z
5
value 0.04749
scoring_system epss
scoring_elements 0.89406
published_at 2026-04-04T12:55:00Z
6
value 0.04749
scoring_system epss
scoring_elements 0.89408
published_at 2026-04-07T12:55:00Z
7
value 0.04749
scoring_system epss
scoring_elements 0.89425
published_at 2026-04-08T12:55:00Z
8
value 0.04749
scoring_system epss
scoring_elements 0.89429
published_at 2026-04-09T12:55:00Z
9
value 0.04749
scoring_system epss
scoring_elements 0.89438
published_at 2026-04-11T12:55:00Z
10
value 0.04749
scoring_system epss
scoring_elements 0.89436
published_at 2026-04-12T12:55:00Z
11
value 0.04749
scoring_system epss
scoring_elements 0.89431
published_at 2026-04-13T12:55:00Z
12
value 0.04749
scoring_system epss
scoring_elements 0.89447
published_at 2026-04-16T12:55:00Z
13
value 0.04749
scoring_system epss
scoring_elements 0.89448
published_at 2026-04-18T12:55:00Z
14
value 0.04749
scoring_system epss
scoring_elements 0.89445
published_at 2026-04-21T12:55:00Z
15
value 0.04749
scoring_system epss
scoring_elements 0.8946
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3072
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521688
reference_id 521688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521688
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072
reference_id CVE-2009-3072
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
reference_id mfsa2009-47
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-47
6
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
reference_id mfsa2010-07
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2010-07
7
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
8
reference_url https://access.redhat.com/errata/RHSA-2009:1431
reference_id RHSA-2009:1431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1431
9
reference_url https://access.redhat.com/errata/RHSA-2009:1432
reference_id RHSA-2009:1432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1432
10
reference_url https://access.redhat.com/errata/RHSA-2010:0153
reference_id RHSA-2010:0153
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0153
11
reference_url https://access.redhat.com/errata/RHSA-2010:0154
reference_id RHSA-2010:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0154
12
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
13
reference_url https://usn.ubuntu.com/915-1/
reference_id USN-915-1
reference_type
scores
url https://usn.ubuntu.com/915-1/
fixed_packages
aliases CVE-2009-3072
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqza-9p8v-4kek
9
url VCID-x2fp-9shs-2ucs
vulnerability_id VCID-x2fp-9shs-2ucs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3078.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3078.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3078
reference_id
reference_type
scores
0
value 0.01724
scoring_system epss
scoring_elements 0.82512
published_at 2026-05-05T12:55:00Z
1
value 0.01724
scoring_system epss
scoring_elements 0.82344
published_at 2026-04-01T12:55:00Z
2
value 0.01724
scoring_system epss
scoring_elements 0.82359
published_at 2026-04-02T12:55:00Z
3
value 0.01724
scoring_system epss
scoring_elements 0.82376
published_at 2026-04-04T12:55:00Z
4
value 0.01724
scoring_system epss
scoring_elements 0.82371
published_at 2026-04-07T12:55:00Z
5
value 0.01724
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-08T12:55:00Z
6
value 0.01724
scoring_system epss
scoring_elements 0.82407
published_at 2026-04-09T12:55:00Z
7
value 0.01724
scoring_system epss
scoring_elements 0.82425
published_at 2026-04-11T12:55:00Z
8
value 0.01724
scoring_system epss
scoring_elements 0.82422
published_at 2026-04-12T12:55:00Z
9
value 0.01724
scoring_system epss
scoring_elements 0.82416
published_at 2026-04-13T12:55:00Z
10
value 0.01724
scoring_system epss
scoring_elements 0.82451
published_at 2026-04-16T12:55:00Z
11
value 0.01724
scoring_system epss
scoring_elements 0.82453
published_at 2026-04-18T12:55:00Z
12
value 0.01724
scoring_system epss
scoring_elements 0.82457
published_at 2026-04-21T12:55:00Z
13
value 0.01724
scoring_system epss
scoring_elements 0.82479
published_at 2026-04-24T12:55:00Z
14
value 0.01724
scoring_system epss
scoring_elements 0.82489
published_at 2026-04-26T12:55:00Z
15
value 0.01724
scoring_system epss
scoring_elements 0.82493
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3078
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=521694
reference_id 521694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=521694
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078
reference_id CVE-2009-3078
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078
4
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
5
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-50
reference_id mfsa2009-50
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-50
6
reference_url https://access.redhat.com/errata/RHSA-2009:1430
reference_id RHSA-2009:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:1430
7
reference_url https://usn.ubuntu.com/821-1/
reference_id USN-821-1
reference_type
scores
url https://usn.ubuntu.com/821-1/
fixed_packages
aliases CVE-2009-3078
risk_score 1.4
exploitability 0.5
weighted_severity 2.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x2fp-9shs-2ucs
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nspr@4.7.5-1%3Farch=el4_8