{"url":"http://public2.vulnerablecode.io/api/packages/128249?format=json","purl":"pkg:rpm/redhat/seamonkey@1.0.9-0.45?arch=el3","type":"rpm","namespace":"redhat","name":"seamonkey","version":"1.0.9-0.45","qualifiers":{"arch":"el3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52982?format=json","vulnerability_id":"VCID-1n9c-e6em-kbb6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3077.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3077","reference_id":"","reference_type":"","scores":[{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90256","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90124","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90127","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90143","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90165","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90193","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90204","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.9023","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90225","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90234","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90247","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3077"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521693","reference_id":"521693","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521693"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077","reference_id":"CVE-2009-3077","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-49","reference_id":"mfsa2009-49","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-49"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"},{"reference_url":"https://usn.ubuntu.com/915-1/","reference_id":"USN-915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/915-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3077"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1n9c-e6em-kbb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52977?format=json","vulnerability_id":"VCID-3bf4-ms9e-x3dq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3076.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3076","reference_id":"","reference_type":"","scores":[{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95164","published_at":"2026-05-15T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95059","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95069","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.9507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95083","published_at":"2026-04-09T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.9509","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95102","published_at":"2026-04-16T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95108","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.9511","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95123","published_at":"2026-05-05T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95129","published_at":"2026-05-07T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95139","published_at":"2026-05-09T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95144","published_at":"2026-05-11T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.9515","published_at":"2026-05-12T12:55:00Z"},{"value":"0.17599","scoring_system":"epss","scoring_elements":"0.95162","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3076"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521692","reference_id":"521692","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521692"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076","reference_id":"CVE-2009-3076","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt","reference_id":"CVE-2009-3076;OSVDB-57977","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/9651.txt"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-48","reference_id":"mfsa2009-48","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-48"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3076"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3bf4-ms9e-x3dq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50696?format=json","vulnerability_id":"VCID-fz23-zbk9-gugq","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2409.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2409","reference_id":"","reference_type":"","scores":[{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81887","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81898","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81951","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.8196","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01642","scoring_system":"epss","scoring_elements":"0.81954","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84497","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84498","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.845","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84527","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84536","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.8454","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84556","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84583","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84599","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84596","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84613","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84644","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02215","scoring_system":"epss","scoring_elements":"0.84653","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2409"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=510197","reference_id":"510197","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=510197"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539895","reference_id":"539895","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539895"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539899","reference_id":"539899","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539899"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://security.gentoo.org/glsa/200912-01","reference_id":"GLSA-200912-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200912-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1184","reference_id":"RHSA-2009:1184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1186","reference_id":"RHSA-2009:1186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1190","reference_id":"RHSA-2009:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1207","reference_id":"RHSA-2009:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1560","reference_id":"RHSA-2009:1560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1571","reference_id":"RHSA-2009:1571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1584","reference_id":"RHSA-2009:1584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0054","reference_id":"RHSA-2010:0054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0054"},{"reference_url":"https://usn.ubuntu.com/809-1/","reference_id":"USN-809-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/809-1/"},{"reference_url":"https://usn.ubuntu.com/810-1/","reference_id":"USN-810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/810-1/"},{"reference_url":"https://usn.ubuntu.com/830-1/","reference_id":"USN-830-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/830-1/"},{"reference_url":"https://usn.ubuntu.com/859-1/","reference_id":"USN-859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/859-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2409"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fz23-zbk9-gugq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52970?format=json","vulnerability_id":"VCID-jwsm-57gb-jkb4","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3075","reference_id":"","reference_type":"","scores":[{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91126","published_at":"2026-05-15T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91109","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91119","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90976","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.90981","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.9099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91018","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.9105","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91052","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91065","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91063","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91074","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91089","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.91102","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06395","scoring_system":"epss","scoring_elements":"0.911","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3075"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521691","reference_id":"521691","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075","reference_id":"CVE-2009-3075","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47","reference_id":"mfsa2009-47","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07","reference_id":"mfsa2010-07","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"},{"reference_url":"https://usn.ubuntu.com/915-1/","reference_id":"USN-915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/915-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3075"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jwsm-57gb-jkb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52841?format=json","vulnerability_id":"VCID-uytp-sf6j-xyf6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2408.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2408","reference_id":"","reference_type":"","scores":[{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83224","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83054","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83057","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.8308","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83088","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83118","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83139","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.8316","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83177","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01855","scoring_system":"epss","scoring_elements":"0.83212","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85346","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85274","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85286","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85329","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85337","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85351","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85349","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03361","scoring_system":"epss","scoring_elements":"0.87363","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2408"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=510251","reference_id":"510251","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=510251"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539934","reference_id":"539934","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=539934"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408","reference_id":"CVE-2009-2408","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-42","reference_id":"mfsa2009-42","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-42"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1184","reference_id":"RHSA-2009:1184","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1184"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1186","reference_id":"RHSA-2009:1186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1190","reference_id":"RHSA-2009:1190","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1207","reference_id":"RHSA-2009:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://usn.ubuntu.com/810-1/","reference_id":"USN-810-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/810-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2408"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uytp-sf6j-xyf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52933?format=json","vulnerability_id":"VCID-vbtt-wzmx-f3bf","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2654","reference_id":"","reference_type":"","scores":[{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94211","published_at":"2026-05-15T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94092","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94129","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94134","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94133","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.9415","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94155","published_at":"2026-04-21T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94162","published_at":"2026-05-05T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94173","published_at":"2026-05-07T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94185","published_at":"2026-05-09T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.9419","published_at":"2026-05-11T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94194","published_at":"2026-05-12T12:55:00Z"},{"value":"0.13196","scoring_system":"epss","scoring_elements":"0.94208","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2654"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521311","reference_id":"521311","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521311"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654","reference_id":"CVE-2009-2654","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html","reference_id":"CVE-2009-2654;OSVDB-56717","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33103.html"},{"reference_url":"https://www.securityfocus.com/bid/35803/info","reference_id":"CVE-2009-2654;OSVDB-56717","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/35803/info"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-44","reference_id":"mfsa2009-44","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-44"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://usn.ubuntu.com/811-1/","reference_id":"USN-811-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/811-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2654"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbtt-wzmx-f3bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52962?format=json","vulnerability_id":"VCID-wqza-9p8v-4kek","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3072.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3072","reference_id":"","reference_type":"","scores":[{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89542","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89513","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89392","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89396","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89406","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89425","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89429","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89447","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89448","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89445","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.8946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89464","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89466","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89473","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04749","scoring_system":"epss","scoring_elements":"0.89502","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3072"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=521688","reference_id":"521688","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=521688"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072","reference_id":"CVE-2009-3072","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47","reference_id":"mfsa2009-47","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-47"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07","reference_id":"mfsa2010-07","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1430","reference_id":"RHSA-2009:1430","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1430"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1431","reference_id":"RHSA-2009:1431","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1431"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1432","reference_id":"RHSA-2009:1432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"},{"reference_url":"https://usn.ubuntu.com/821-1/","reference_id":"USN-821-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/821-1/"},{"reference_url":"https://usn.ubuntu.com/915-1/","reference_id":"USN-915-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/915-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3072"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wqza-9p8v-4kek"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-0.45%3Farch=el3"}