Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/firefox@3.0.10-1?arch=el5
Typerpm
Namespaceredhat
Namefirefox
Version3.0.10-1
Qualifiers
arch el5
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-m4ku-qwf1-zbd6
vulnerability_id VCID-m4ku-qwf1-zbd6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1313.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1313
reference_id
reference_type
scores
0
value 0.32166
scoring_system epss
scoring_elements 0.96852
published_at 2026-05-05T12:55:00Z
1
value 0.32166
scoring_system epss
scoring_elements 0.96802
published_at 2026-04-01T12:55:00Z
2
value 0.32166
scoring_system epss
scoring_elements 0.96809
published_at 2026-04-02T12:55:00Z
3
value 0.32166
scoring_system epss
scoring_elements 0.96811
published_at 2026-04-04T12:55:00Z
4
value 0.32166
scoring_system epss
scoring_elements 0.96815
published_at 2026-04-07T12:55:00Z
5
value 0.32166
scoring_system epss
scoring_elements 0.96823
published_at 2026-04-08T12:55:00Z
6
value 0.32166
scoring_system epss
scoring_elements 0.96824
published_at 2026-04-09T12:55:00Z
7
value 0.32166
scoring_system epss
scoring_elements 0.96826
published_at 2026-04-11T12:55:00Z
8
value 0.32166
scoring_system epss
scoring_elements 0.96827
published_at 2026-04-12T12:55:00Z
9
value 0.32166
scoring_system epss
scoring_elements 0.96828
published_at 2026-04-13T12:55:00Z
10
value 0.32166
scoring_system epss
scoring_elements 0.96834
published_at 2026-04-16T12:55:00Z
11
value 0.32166
scoring_system epss
scoring_elements 0.96838
published_at 2026-04-18T12:55:00Z
12
value 0.32166
scoring_system epss
scoring_elements 0.9684
published_at 2026-04-24T12:55:00Z
13
value 0.32166
scoring_system epss
scoring_elements 0.96842
published_at 2026-04-26T12:55:00Z
14
value 0.32166
scoring_system epss
scoring_elements 0.96845
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1313
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=497447
reference_id 497447
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=497447
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313
reference_id CVE-2009-1313
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32961.html
reference_id CVE-2009-1313;OSVDB-54174
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/32961.html
5
reference_url https://www.securityfocus.com/bid/34743/info
reference_id CVE-2009-1313;OSVDB-54174
reference_type exploit
scores
url https://www.securityfocus.com/bid/34743/info
6
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-23
reference_id mfsa2009-23
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-23
8
reference_url https://access.redhat.com/errata/RHSA-2009:0449
reference_id RHSA-2009:0449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0449
9
reference_url https://usn.ubuntu.com/765-1/
reference_id USN-765-1
reference_type
scores
url https://usn.ubuntu.com/765-1/
fixed_packages
aliases CVE-2009-1313
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m4ku-qwf1-zbd6
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/firefox@3.0.10-1%3Farch=el5