{"url":"http://public2.vulnerablecode.io/api/packages/128409?format=json","purl":"pkg:rpm/redhat/seamonkey@1.0.9-43?arch=el4_8","type":"rpm","namespace":"redhat","name":"seamonkey","version":"1.0.9-43","qualifiers":{"arch":"el4_8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52620?format=json","vulnerability_id":"VCID-1ntj-aahx-37hu","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1833.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1833","reference_id":"","reference_type":"","scores":[{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.9322","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93176","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93186","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.9319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93188","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93197","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93201","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93203","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1037","scoring_system":"epss","scoring_elements":"0.93205","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1833"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=503570","reference_id":"503570","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=503570"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833","reference_id":"CVE-2009-1833","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1833"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-24","reference_id":"mfsa2009-24","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1095","reference_id":"RHSA-2009:1095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1096","reference_id":"RHSA-2009:1096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1125","reference_id":"RHSA-2009:1125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1126","reference_id":"RHSA-2009:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1126"},{"reference_url":"https://usn.ubuntu.com/779-1/","reference_id":"USN-779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/779-1/"},{"reference_url":"https://usn.ubuntu.com/782-1/","reference_id":"USN-782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/782-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1833"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ntj-aahx-37hu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52732?format=json","vulnerability_id":"VCID-9qwt-b4rw-1bgp","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1841.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1841.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1841","reference_id":"","reference_type":"","scores":[{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88732","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.8876","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88777","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88794","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04241","scoring_system":"epss","scoring_elements":"0.88789","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1841"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=503583","reference_id":"503583","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=503583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841","reference_id":"CVE-2009-1841","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1841"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-32","reference_id":"mfsa2009-32","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1095","reference_id":"RHSA-2009:1095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1096","reference_id":"RHSA-2009:1096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1096"},{"reference_url":"https://usn.ubuntu.com/779-1/","reference_id":"USN-779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/779-1/"},{"reference_url":"https://usn.ubuntu.com/782-1/","reference_id":"USN-782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/782-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1841"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9qwt-b4rw-1bgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52644?format=json","vulnerability_id":"VCID-k3ye-858q-x3ew","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1835.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1835.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1835","reference_id":"","reference_type":"","scores":[{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81441","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.8134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81349","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81371","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81369","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81397","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81402","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81423","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81411","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01548","scoring_system":"epss","scoring_elements":"0.81404","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1835"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=503576","reference_id":"503576","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=503576"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835","reference_id":"CVE-2009-1835","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1835"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-26","reference_id":"mfsa2009-26","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-26"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1095","reference_id":"RHSA-2009:1095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1096","reference_id":"RHSA-2009:1096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1096"},{"reference_url":"https://usn.ubuntu.com/779-1/","reference_id":"USN-779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/779-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1835"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3ye-858q-x3ew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52692?format=json","vulnerability_id":"VCID-r4x1-akj3-b3hr","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1838.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1838.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1838","reference_id":"","reference_type":"","scores":[{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89291","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89231","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89237","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89254","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89271","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04629","scoring_system":"epss","scoring_elements":"0.89277","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=503580","reference_id":"503580","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=503580"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838","reference_id":"CVE-2009-1838","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1838"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-29","reference_id":"mfsa2009-29","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-29"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1095","reference_id":"RHSA-2009:1095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1096","reference_id":"RHSA-2009:1096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1125","reference_id":"RHSA-2009:1125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1126","reference_id":"RHSA-2009:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1126"},{"reference_url":"https://usn.ubuntu.com/779-1/","reference_id":"USN-779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/779-1/"},{"reference_url":"https://usn.ubuntu.com/782-1/","reference_id":"USN-782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/782-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1838"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r4x1-akj3-b3hr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/52549?format=json","vulnerability_id":"VCID-y9uf-pn44-7qcj","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1392.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1392","reference_id":"","reference_type":"","scores":[{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.9473","published_at":"2026-04-16T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94684","published_at":"2026-04-01T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94698","published_at":"2026-04-07T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94708","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94712","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94716","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.9472","published_at":"2026-04-12T12:55:00Z"},{"value":"0.15734","scoring_system":"epss","scoring_elements":"0.94721","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1392"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=503568","reference_id":"503568","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=503568"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392","reference_id":"CVE-2009-1392","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1392"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-24","reference_id":"mfsa2009-24","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2009-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1095","reference_id":"RHSA-2009:1095","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1095"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1096","reference_id":"RHSA-2009:1096","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1096"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1125","reference_id":"RHSA-2009:1125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1126","reference_id":"RHSA-2009:1126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1126"},{"reference_url":"https://usn.ubuntu.com/779-1/","reference_id":"USN-779-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/779-1/"},{"reference_url":"https://usn.ubuntu.com/782-1/","reference_id":"USN-782-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/782-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1392"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y9uf-pn44-7qcj"}],"fixing_vulnerabilities":[],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-43%3Farch=el4_8"}