{"url":"http://public2.vulnerablecode.io/api/packages/128247?format=json","purl":"pkg:rpm/redhat/nspr@4.7.5-1?arch=el4_8","type":"rpm","namespace":"redhat","name":"nspr","version":"4.7.5-1","qualifiers":{"arch":"el4_8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52955?format=json","vulnerability_id":"VCID-1bhg-rmd2-7uhe","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3070.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3070.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3070","reference_id":"","reference_type":"","scores":[{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88529","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88435","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88443","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88458","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88461","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.8848","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88486","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88489","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88503","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88514","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04029","scoring_system":"epss","scoring_elements":"0.88519","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3070"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521686","reference_id":"521686","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521686"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070","reference_id":"CVE-2009-3070","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47","reference_id":"mfsa2009-47","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3070"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1bhg-rmd2-7uhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52982?format=json","vulnerability_id":"VCID-1n9c-e6em-kbb6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3077","reference_id":"","reference_type":"","scores":[{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90124","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90127","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90143","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90193","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3077"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521693","reference_id":"521693","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077","reference_id":"CVE-2009-3077","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-49","reference_id":"mfsa2009-49","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"},{"reference_url":"https://usn.ubuntu.com/915-1/","reference_id":"USN-915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/915-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3077"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1n9c-e6em-kbb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52977?format=json","vulnerability_id":"VCID-3bf4-ms9e-x3dq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3076","reference_id":"","reference_type":"","scores":[{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95123","published_at":"2026-05-05T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95069","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.9507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.9509","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95102","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.9511","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3076"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521692","reference_id":"521692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076","reference_id":"CVE-2009-3076","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt","reference_id":"CVE-2009-3076;OSVDB-57977","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-48","reference_id":"mfsa2009-48","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3076"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3bf4-ms9e-x3dq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52966?format=json","vulnerability_id":"VCID-3ydc-sd86-vkgg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3074.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3074.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3074","reference_id":"","reference_type":"","scores":[{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.91039","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.9094","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.90945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.90954","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.90964","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.90975","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.90981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.90989","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.9099","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.91014","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.91012","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.91015","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.91029","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06345","scoring_system":"epss","scoring_elements":"0.91024","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521690","reference_id":"521690","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521690"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074","reference_id":"CVE-2009-3074","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47","reference_id":"mfsa2009-47","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3074"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3ydc-sd86-vkgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52960?format=json","vulnerability_id":"VCID-4yz1-a716-kkh4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3071.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3071","reference_id":"","reference_type":"","scores":[{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.8699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.8687","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.8688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86934","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86924","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86939","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.8696","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86967","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03163","scoring_system":"epss","scoring_elements":"0.86969","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3071"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521687","reference_id":"521687","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521687"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071","reference_id":"CVE-2009-3071","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47","reference_id":"mfsa2009-47","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3071"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4yz1-a716-kkh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52970?format=json","vulnerability_id":"VCID-jwsm-57gb-jkb4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3075","reference_id":"","reference_type":"","scores":[{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91074","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90976","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.9099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91018","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.9105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91052","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91065","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3075"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521691","reference_id":"521691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075","reference_id":"CVE-2009-3075","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47","reference_id":"mfsa2009-47","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07","reference_id":"mfsa2010-07","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"},{"reference_url":"https://usn.ubuntu.com/915-1/","reference_id":"USN-915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/915-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3075"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwsm-57gb-jkb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52989?format=json","vulnerability_id":"VCID-q4zw-qbrc-p3bf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3079.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3079.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3079","reference_id":"","reference_type":"","scores":[{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81133","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81165","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81197","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81217","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81233","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81234","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81255","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81262","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0151","scoring_system":"epss","scoring_elements":"0.81268","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3079"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521695","reference_id":"521695","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079","reference_id":"CVE-2009-3079","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-51","reference_id":"mfsa2009-51","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-51"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3079"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q4zw-qbrc-p3bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52933?format=json","vulnerability_id":"VCID-vbtt-wzmx-f3bf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2654","reference_id":"","reference_type":"","scores":[{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94162","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94092","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94134","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.9415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94157","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521311","reference_id":"521311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654","reference_id":"CVE-2009-2654","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html","reference_id":"CVE-2009-2654;OSVDB-56717","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html"},{"reference_url":"https://www.securityfocus.com/bid/35803/info","reference_id":"CVE-2009-2654;OSVDB-56717","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/35803/info"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-44","reference_id":"mfsa2009-44","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://usn.ubuntu.com/811-1/","reference_id":"USN-811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/811-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2654"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbtt-wzmx-f3bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52962?format=json","vulnerability_id":"VCID-wqza-9p8v-4kek","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3072","reference_id":"","reference_type":"","scores":[{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89473","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89464","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89392","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89447","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89448","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89445","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.8946","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3072"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521688","reference_id":"521688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072","reference_id":"CVE-2009-3072","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47","reference_id":"mfsa2009-47","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07","reference_id":"mfsa2010-07","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"},{"reference_url":"https://usn.ubuntu.com/915-1/","reference_id":"USN-915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/915-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3072"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqza-9p8v-4kek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52985?format=json","vulnerability_id":"VCID-x2fp-9shs-2ucs","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3078.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3078.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3078","reference_id":"","reference_type":"","scores":[{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82512","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82344","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82376","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82371","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82407","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82416","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82453","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82457","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01724","scoring_system":"epss","scoring_elements":"0.82493","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3078"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521694","reference_id":"521694","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078","reference_id":"CVE-2009-3078","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-50","reference_id":"mfsa2009-50","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-50"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3078"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x2fp-9shs-2ucs"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nspr@4.7.5-1%3Farch=el4_8"}