{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","type":"mozilla","namespace":"","name":"Firefox","version":"3.6.2","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"3.6.3","latest_non_vulnerable_version":"150.0.3","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53176?format=json","vulnerability_id":"VCID-3g27-z9v5-a3ar","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0168","reference_id":"","reference_type":"","scores":[{"value":"0.09435","scoring_system":"epss","scoring_elements":"0.92828","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.92994","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93003","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93006","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93014","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93018","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93022","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93032","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93035","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93042","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93048","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09931","scoring_system":"epss","scoring_elements":"0.93045","published_at":"2026-04-29T12:55:00Z"},{"value":"0.12288","scoring_system":"epss","scoring_elements":"0.93942","published_at":"2026-05-14T12:55:00Z"},{"value":"0.12288","scoring_system":"epss","scoring_elements":"0.93909","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12288","scoring_system":"epss","scoring_elements":"0.93919","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12288","scoring_system":"epss","scoring_elements":"0.93922","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12288","scoring_system":"epss","scoring_elements":"0.93927","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0168"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0168","reference_id":"CVE-2010-0168","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0168"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33798.html","reference_id":"CVE-2010-0168;OSVDB-63269","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/33798.html"},{"reference_url":"https://www.securityfocus.com/bid/38927/info","reference_id":"CVE-2010-0168;OSVDB-63269","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/38927/info"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-13","reference_id":"mfsa2010-13","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-13"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0168"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3g27-z9v5-a3ar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53234?format=json","vulnerability_id":"VCID-5xws-gvka-wqbg","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0172","reference_id":"","reference_type":"","scores":[{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.6763","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67381","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67417","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67439","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67418","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67469","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67483","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67493","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.6746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67496","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67507","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67485","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67504","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67516","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.6749","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67534","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67572","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67544","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00535","scoring_system":"epss","scoring_elements":"0.67569","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0172"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0172","reference_id":"CVE-2010-0172","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0172"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-15","reference_id":"mfsa2010-15","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-15"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0172"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5xws-gvka-wqbg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53338?format=json","vulnerability_id":"VCID-67r4-w5pm-2udm","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0182.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0182","reference_id":"","reference_type":"","scores":[{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79918","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.7968","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79688","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79723","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.7973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79751","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79735","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79729","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79759","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79762","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79791","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79813","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79827","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79852","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79868","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.79864","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01301","scoring_system":"epss","scoring_elements":"0.7988","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0182"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=586580","reference_id":"586580","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=586580"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182","reference_id":"CVE-2010-0182","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-24","reference_id":"mfsa2010-24","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0500","reference_id":"RHSA-2010:0500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0500"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0501","reference_id":"RHSA-2010:0501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0501"},{"reference_url":"https://usn.ubuntu.com/921-1/","reference_id":"USN-921-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/921-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86557?format=json","purl":"pkg:mozilla/Firefox@3.5.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.9"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0182"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-67r4-w5pm-2udm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53210?format=json","vulnerability_id":"VCID-8twm-575k-9qah","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0170","reference_id":"","reference_type":"","scores":[{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66114","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.6586","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65901","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65931","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65897","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.6596","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65978","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65965","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65935","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65985","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65973","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66003","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66025","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66068","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66038","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66058","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0170"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0170","reference_id":"CVE-2010-0170","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0170"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-10","reference_id":"mfsa2010-10","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0170"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8twm-575k-9qah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53333?format=json","vulnerability_id":"VCID-a6wu-qdg8-fug3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0181","reference_id":"","reference_type":"","scores":[{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.8587","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85637","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.8565","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85715","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85711","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85733","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85756","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85784","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85823","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85821","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85835","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181","reference_id":"CVE-2010-0181","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-23","reference_id":"mfsa2010-23","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-23"},{"reference_url":"https://usn.ubuntu.com/921-1/","reference_id":"USN-921-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/921-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86557?format=json","purl":"pkg:mozilla/Firefox@3.5.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.9"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0181"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6wu-qdg8-fug3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53112?format=json","vulnerability_id":"VCID-a8fc-enf4-yyhv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0164","reference_id":"","reference_type":"","scores":[{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91881","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91769","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91778","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91783","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91791","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91804","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91811","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91814","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91816","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91812","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91826","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.9184","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91852","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91862","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91861","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07524","scoring_system":"epss","scoring_elements":"0.91868","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0164"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0164","reference_id":"CVE-2010-0164","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0164"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-09","reference_id":"mfsa2010-09","reference_type":"","scores":[{"value":"none","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-09"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0164"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a8fc-enf4-yyhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53251?format=json","vulnerability_id":"VCID-jad1-3fd1-3ue6","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0173","reference_id":"","reference_type":"","scores":[{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91909","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91803","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91808","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91829","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91836","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91839","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91837","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91857","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91859","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91858","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91854","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91867","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91879","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91888","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91887","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0757","scoring_system":"epss","scoring_elements":"0.91895","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173","reference_id":"CVE-2010-0173","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-16","reference_id":"mfsa2010-16","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-16"},{"reference_url":"https://usn.ubuntu.com/921-1/","reference_id":"USN-921-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/921-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86558?format=json","purl":"pkg:mozilla/Firefox@3.0.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.19"},{"url":"http://public2.vulnerablecode.io/api/packages/86557?format=json","purl":"pkg:mozilla/Firefox@3.5.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.9"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0173"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jad1-3fd1-3ue6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47?format=json","vulnerability_id":"VCID-jau7-gfz8-dkfa","summary":"The renegotiation vulnerability in SSL protocol","references":[{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://archives.neohapsis.com/archives/bugtraq/2013-11/0120.html"},{"reference_url":"http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html"},{"reference_url":"http://blogs.iss.net/archive/sslmitmiscsrf.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blogs.iss.net/archive/sslmitmiscsrf.html"},{"reference_url":"http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://blogs.sun.com/security/entry/vulnerability_in_tls_protocol_during"},{"reference_url":"http://clicky.me/tlsvuln","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://clicky.me/tlsvuln"},{"reference_url":"http://extendedsubset.com/?p=8","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://extendedsubset.com/?p=8"},{"reference_url":"http://extendedsubset.com/Renegotiating_TLS.pdf","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://extendedsubset.com/Renegotiating_TLS.pdf"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01945686"},{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02436041"},{"reference_url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02273751"},{"reference_url":"http://kbase.redhat.com/faq/docs/DOC-20491","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://kbase.redhat.com/faq/docs/DOC-20491"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2010/Jan/msg00000.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//May/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2010//May/msg00001.html"},{"reference_url":"http://lists.apple.com/archives/security-announce/2010//May/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2010//May/msg00002.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039561.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039957.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040652.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049455.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049528.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2010-October/049702.html"},{"reference_url":"http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.gnu.org/archive/html/gnutls-devel/2009-11/msg00029.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00014.html"},{"reference_url":"http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=126150535619567&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=126150535619567&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=127128920008563&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=127419602507642&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=127419602507642&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=127557596201693&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=127557596201693&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=130497311408250&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=130497311408250&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=132077688910227&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=132077688910227&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=133469267822771&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=134254866602253&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=142660345230545&w=2"},{"reference_url":"http://marc.info/?l=cryptography&m=125752275331877&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=cryptography&m=125752275331877&w=2"},{"reference_url":"http://openbsd.org/errata45.html#010_openssl","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://openbsd.org/errata45.html#010_openssl"},{"reference_url":"http://openbsd.org/errata46.html#004_openssl","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://openbsd.org/errata46.html#004_openssl"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1579","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2009:1579"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1580","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2009:1580"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1694","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2009:1694"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0011","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0119","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0130","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0130"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0155","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0162","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0162"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0163","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0163"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0164","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0164"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0165","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0166","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0167","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0337","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0338","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0339","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0408","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0408"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0440","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0768","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0768"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0770","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0770"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0786","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0807","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0865","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0865"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0986","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0986"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0987","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2010:0987"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0880","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2011:0880"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1591","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2015:1591"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3555.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3555.json"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2009-3555","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/security/cve/CVE-2009-3555"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3555","reference_id":"","reference_type":"","scores":[{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83726","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83576","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83691","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.836","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01971","scoring_system":"epss","scoring_elements":"0.83676","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02025","scoring_system":"epss","scoring_elements":"0.83874","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02025","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02025","scoring_system":"epss","scoring_elements":"0.83895","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02025","scoring_system":"epss","scoring_elements":"0.83851","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84711","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84642","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84628","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84701","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02288","scoring_system":"epss","scoring_elements":"0.84723","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3555"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=526689","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=526689"},{"reference_url":"https://bugzilla.mozilla.org/show_bug.cgi?id=545755","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=545755"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=533125","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=533125"},{"reference_url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=50325","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bz.apache.org/bugzilla/show_bug.cgi?id=50325"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566"},{"reference_url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-049"},{"reference_url":"http://seclists.org/fulldisclosure/2009/Nov/139","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://seclists.org/fulldisclosure/2009/Nov/139"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200912-01.xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://security.gentoo.org/glsa/glsa-200912-01.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201203-22.xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://security.gentoo.org/glsa/glsa-201203-22.xml"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201406-32.xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/54158","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/54158"},{"reference_url":"https://github.com/apache/tomcat","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat"},{"reference_url":"https://github.com/apache/tomcat55/commit/359c7ee17f5759cc99988e1cc9e971fe4a6ffad5","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/tomcat55/commit/359c7ee17f5759cc99988e1cc9e971fe4a6ffad5"},{"reference_url":"https://github.com/apache/tomcat/commit/14e4efd925da58b9fa63f20969fb7349b8a9c30d","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/14e4efd925da58b9fa63f20969fb7349b8a9c30d"},{"reference_url":"https://github.com/apache/tomcat/commit/2d4ca03acc27cc883c404d1745d92f983b6fada3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/2d4ca03acc27cc883c404d1745d92f983b6fada3"},{"reference_url":"https://github.com/apache/tomcat/commit/30af3f5630542a2340781f66553e734a6fd69701","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/30af3f5630542a2340781f66553e734a6fd69701"},{"reference_url":"https://github.com/apache/tomcat/commit/328a523cbb2a2d4cd55283180614d4e03e2f8f02","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/328a523cbb2a2d4cd55283180614d4e03e2f8f02"},{"reference_url":"https://github.com/apache/tomcat/commit/3d315ac9dfaa2c03b4df82938d78bf5b755766b3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/3d315ac9dfaa2c03b4df82938d78bf5b755766b3"},{"reference_url":"https://github.com/apache/tomcat/commit/56f67141e82e16f68a860c3af9b7342da35cbe7d","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/56f67141e82e16f68a860c3af9b7342da35cbe7d"},{"reference_url":"https://github.com/apache/tomcat/commit/b4e9488629bf03b4b65abf335e536e85386d1366","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/b4e9488629bf03b4b65abf335e536e85386d1366"},{"reference_url":"https://github.com/apache/tomcat/commit/df9633116b5fec8f47f1f008fb89a6e9d5895cd0","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/tomcat/commit/df9633116b5fec8f47f1f008fb89a6e9d5895cd0"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150888"},{"reference_url":"https://kb.bluecoat.com/index?page=content&id=SA50","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://kb.bluecoat.com/index?page=content&id=SA50"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.597446"},{"reference_url":"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@<dev.tomcat.apache.org>","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@<dev.tomcat.apache.org>"},{"reference_url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@<dev.tomcat.apache.org>","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2@<dev.tomcat.apache.org>"},{"reference_url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@<dev.tomcat.apache.org>","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220@<dev.tomcat.apache.org>"},{"reference_url":"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@<dev.tomcat.apache.org>","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@<dev.tomcat.apache.org>"},{"reference_url":"https://nginx.org/download/patch.cve-2009-3555.txt","reference_id":"","reference_type":"","scores":[],"url":"https://nginx.org/download/patch.cve-2009-3555.txt"},{"reference_url":"https://nginx.org/download/patch.cve-2009-3555.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"https://nginx.org/download/patch.cve-2009-3555.txt.asc"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:10088","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:10088"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11578","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11578"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11617","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:11617"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7315","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7315"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7478","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7478"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7973","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:7973"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8366","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8366"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8535","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval:org.mitre.oval:def:8535"},{"reference_url":"https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://support.f5.com/kb/en-us/solutions/public/10000/700/sol10737.html"},{"reference_url":"https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt"},{"reference_url":"https://tomcat.apache.org/security-5.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://tomcat.apache.org/security-5.html"},{"reference_url":"https://tomcat.apache.org/security-6.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://tomcat.apache.org/security-6.html"},{"reference_url":"https://tomcat.apache.org/security-7.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://tomcat.apache.org/security-7.html"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-273350-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-273029-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-274990-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021653.1-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021752.1-1"},{"reference_url":"http://support.apple.com/kb/HT4004","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT4004"},{"reference_url":"http://support.apple.com/kb/HT4170","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT4170"},{"reference_url":"http://support.apple.com/kb/HT4171","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT4171"},{"reference_url":"http://support.avaya.com/css/P8/documents/100070150","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.avaya.com/css/P8/documents/100070150"},{"reference_url":"http://support.avaya.com/css/P8/documents/100081611","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.avaya.com/css/P8/documents/100081611"},{"reference_url":"http://support.avaya.com/css/P8/documents/100114315","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.avaya.com/css/P8/documents/100114315"},{"reference_url":"http://support.avaya.com/css/P8/documents/100114327","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.avaya.com/css/P8/documents/100114327"},{"reference_url":"http://support.citrix.com/article/CTX123359","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.citrix.com/article/CTX123359"},{"reference_url":"http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.zeus.com/zws/media/docs/4.3/RELEASE_NOTES"},{"reference_url":"http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.zeus.com/zws/news/2010/01/13/zws_4_3r5_released"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00428.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00442.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00449.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00634.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00645.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00944.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01020.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01029.html"},{"reference_url":"http://sysoev.ru/nginx/patch.cve-2009-3555.txt","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sysoev.ru/nginx/patch.cve-2009-3555.txt"},{"reference_url":"http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://tomcat.apache.org/native-doc/miscellaneous/changelog-1.1.x.html"},{"reference_url":"http://ubuntu.com/usn/usn-923-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://ubuntu.com/usn/usn-923-1"},{"reference_url":"http://wiki.rpath.com/Advisories:rPSA-2009-0155","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://wiki.rpath.com/Advisories:rPSA-2009-0155"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC67848"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68054"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC68055"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12247"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21426108","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21426108"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21432298","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21432298"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg24006386","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24006386"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg24025312","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg24025312"},{"reference_url":"http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=PM00675&apar=only"},{"reference_url":"http://www.arubanetworks.com/support/alerts/aid-020810.txt","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.arubanetworks.com/support/alerts/aid-020810.txt"},{"reference_url":"http://www.betanews.com/article/1257452450","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.betanews.com/article/1257452450"},{"reference_url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.cisco.com/en/US/products/products_security_advisory09186a0080b01d1d.shtml"},{"reference_url":"http://www.debian.org/security/2009/dsa-1934","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2009/dsa-1934"},{"reference_url":"http://www.debian.org/security/2011/dsa-2141","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2011/dsa-2141"},{"reference_url":"http://www.debian.org/security/2015/dsa-3253","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2015/dsa-3253"},{"reference_url":"http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html"},{"reference_url":"http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS10-030/index.html"},{"reference_url":"http://www.ietf.org/mail-archive/web/tls/current/msg03928.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ietf.org/mail-archive/web/tls/current/msg03928.html"},{"reference_url":"http://www.ietf.org/mail-archive/web/tls/current/msg03948.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ietf.org/mail-archive/web/tls/current/msg03948.html"},{"reference_url":"http://www.ingate.com/Relnote.php?ver=481","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ingate.com/Relnote.php?ver=481"},{"reference_url":"http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02512995"},{"reference_url":"http://www.kb.cert.org/vuls/id/120541","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.kb.cert.org/vuls/id/120541"},{"reference_url":"http://www.links.org/?p=780","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.links.org/?p=780"},{"reference_url":"http://www.links.org/?p=786","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.links.org/?p=786"},{"reference_url":"http://www.links.org/?p=789","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.links.org/?p=789"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:076"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:084","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:084"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:089","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:089"},{"reference_url":"http://www.mozilla.org/security/announce/2010/mfsa2010-22.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mozilla.org/security/announce/2010/mfsa2010-22.html"},{"reference_url":"http://www.openoffice.org/security/cves/CVE-2009-3555.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openoffice.org/security/cves/CVE-2009-3555.html"},{"reference_url":"http://www.openssl.org/news/secadv_20091111.txt","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openssl.org/news/secadv_20091111.txt"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/11/05/3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/11/05/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/11/05/5","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/11/05/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/11/06/3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/11/06/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/11/07/3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/11/07/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/11/20/1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/11/20/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/11/23/10","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/11/23/10"},{"reference_url":"http://www.opera.com/docs/changelogs/unix/1060","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.opera.com/docs/changelogs/unix/1060"},{"reference_url":"http://www.opera.com/support/search/view/944","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.opera.com/support/search/view/944"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/javacpuoct2010-176258.html"},{"reference_url":"http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.proftpd.org/docs/RELEASE_NOTES-1.3.2c"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0119.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0119.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0130.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0130.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0155.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0155.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0165.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0165.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0167.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0167.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0337.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0337.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0338.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0338.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0339.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0339.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0768.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0768.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0770.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0770.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0786.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0786.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0807.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0807.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0865.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0865.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0986.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0986.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0987.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2010-0987.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0880.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2011-0880.html"},{"reference_url":"http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securegoose.org/2009/11/tls-renegotiation-vulnerability-cve.html"},{"reference_url":"http://www.tombom.co.uk/blog/?p=85","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.tombom.co.uk/blog/?p=85"},{"reference_url":"http://www.ubuntu.com/usn/USN-1010-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-1010-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-927-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-927-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-927-4","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-927-4"},{"reference_url":"http://www.ubuntu.com/usn/USN-927-5","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-927-5"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA10-222A.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.us-cert.gov/cas/techalerts/TA10-222A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA10-287A.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.us-cert.gov/cas/techalerts/TA10-287A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2010-0019.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/security/advisories/VMSA-2010-0019.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0003.html"},{"reference_url":"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765649","reference_id":"765649","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765649"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10579.py","reference_id":"CVE-2009-3555","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10579.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3555","reference_id":"CVE-2009-3555","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-3555"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10071.txt","reference_id":"CVE-2009-3555;OSVDB-59970","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/10071.txt"},{"reference_url":"https://www.securityfocus.com/bid/35888/info","reference_id":"CVE-2009-3555;OSVDB-59970","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/35888/info"},{"reference_url":"https://github.com/advisories/GHSA-f7w7-6pjc-wwm6","reference_id":"GHSA-f7w7-6pjc-wwm6","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-f7w7-6pjc-wwm6"},{"reference_url":"https://security.gentoo.org/glsa/200912-01","reference_id":"GLSA-200912-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200912-01"},{"reference_url":"https://security.gentoo.org/glsa/201006-18","reference_id":"GLSA-201006-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201006-18"},{"reference_url":"https://security.gentoo.org/glsa/201110-05","reference_id":"GLSA-201110-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-05"},{"reference_url":"https://security.gentoo.org/glsa/201203-22","reference_id":"GLSA-201203-22","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201203-22"},{"reference_url":"https://security.gentoo.org/glsa/201206-18","reference_id":"GLSA-201206-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201206-18"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://security.gentoo.org/glsa/201309-15","reference_id":"GLSA-201309-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201309-15"},{"reference_url":"https://security.gentoo.org/glsa/201311-13","reference_id":"GLSA-201311-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201311-13"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-22","reference_id":"mfsa2010-22","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-22"},{"reference_url":"https://usn.ubuntu.com/1010-1/","reference_id":"USN-1010-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1010-1/"},{"reference_url":"https://usn.ubuntu.com/860-1/","reference_id":"USN-860-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/860-1/"},{"reference_url":"https://usn.ubuntu.com/923-1/","reference_id":"USN-923-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/923-1/"},{"reference_url":"https://usn.ubuntu.com/927-1/","reference_id":"USN-927-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/927-1/"},{"reference_url":"https://usn.ubuntu.com/927-4/","reference_id":"USN-927-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/927-4/"},{"reference_url":"https://usn.ubuntu.com/927-6/","reference_id":"USN-927-6","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/927-6/"},{"reference_url":"https://usn.ubuntu.com/990-1/","reference_id":"USN-990-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/990-1/"},{"reference_url":"https://usn.ubuntu.com/990-2/","reference_id":"USN-990-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/990-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86557?format=json","purl":"pkg:mozilla/Firefox@3.5.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.9"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2009-3555","GHSA-f7w7-6pjc-wwm6","VU#120541"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jau7-gfz8-dkfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53326?format=json","vulnerability_id":"VCID-pax5-3cys-5khv","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0178.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0178","reference_id":"","reference_type":"","scores":[{"value":"0.03519","scoring_system":"epss","scoring_elements":"0.87768","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03519","scoring_system":"epss","scoring_elements":"0.87677","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03519","scoring_system":"epss","scoring_elements":"0.87693","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03519","scoring_system":"epss","scoring_elements":"0.87708","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03519","scoring_system":"epss","scoring_elements":"0.87726","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03519","scoring_system":"epss","scoring_elements":"0.87723","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03519","scoring_system":"epss","scoring_elements":"0.87736","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89628","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89631","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.8965","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89583","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89586","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89599","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.896","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0493","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0178"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=578154","reference_id":"578154","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=578154"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178","reference_id":"CVE-2010-0178","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-20","reference_id":"mfsa2010-20","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0332","reference_id":"RHSA-2010:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0332"},{"reference_url":"https://usn.ubuntu.com/920-1/","reference_id":"USN-920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/920-1/"},{"reference_url":"https://usn.ubuntu.com/921-1/","reference_id":"USN-921-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/921-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86558?format=json","purl":"pkg:mozilla/Firefox@3.0.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.19"},{"url":"http://public2.vulnerablecode.io/api/packages/86557?format=json","purl":"pkg:mozilla/Firefox@3.5.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.9"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0178"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pax5-3cys-5khv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53324?format=json","vulnerability_id":"VCID-szrv-a2bq-yfe3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0177.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0177","reference_id":"","reference_type":"","scores":[{"value":"0.05472","scoring_system":"epss","scoring_elements":"0.90207","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05472","scoring_system":"epss","scoring_elements":"0.90156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05472","scoring_system":"epss","scoring_elements":"0.90159","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05472","scoring_system":"epss","scoring_elements":"0.90171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05472","scoring_system":"epss","scoring_elements":"0.90176","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05472","scoring_system":"epss","scoring_elements":"0.90192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05472","scoring_system":"epss","scoring_elements":"0.90198","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06273","scoring_system":"epss","scoring_elements":"0.90963","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06273","scoring_system":"epss","scoring_elements":"0.90928","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06273","scoring_system":"epss","scoring_elements":"0.90927","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06273","scoring_system":"epss","scoring_elements":"0.90951","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06273","scoring_system":"epss","scoring_elements":"0.90949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06273","scoring_system":"epss","scoring_elements":"0.9095","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06273","scoring_system":"epss","scoring_elements":"0.90961","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91335","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91274","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91289","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91306","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91317","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91315","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91324","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0177"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=578152","reference_id":"578152","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=578152"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177","reference_id":"CVE-2010-0177","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-19","reference_id":"mfsa2010-19","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0332","reference_id":"RHSA-2010:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0333","reference_id":"RHSA-2010:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0544","reference_id":"RHSA-2010:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0545","reference_id":"RHSA-2010:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0545"},{"reference_url":"https://usn.ubuntu.com/920-1/","reference_id":"USN-920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/920-1/"},{"reference_url":"https://usn.ubuntu.com/921-1/","reference_id":"USN-921-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/921-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86558?format=json","purl":"pkg:mozilla/Firefox@3.0.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.19"},{"url":"http://public2.vulnerablecode.io/api/packages/86557?format=json","purl":"pkg:mozilla/Firefox@3.5.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.9"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0177"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-szrv-a2bq-yfe3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53228?format=json","vulnerability_id":"VCID-usb1-ure3-77ft","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0171.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0171","reference_id":"","reference_type":"","scores":[{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.6702","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.6677","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66834","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66869","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66889","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66875","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.6689","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66873","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66898","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66911","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66879","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66921","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66961","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66933","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00521","scoring_system":"epss","scoring_elements":"0.66956","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0171"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=576696","reference_id":"576696","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=576696"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171","reference_id":"CVE-2010-0171","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-12","reference_id":"mfsa2010-12","reference_type":"","scores":[{"value":"high","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-12"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0112","reference_id":"RHSA-2010:0112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0113","reference_id":"RHSA-2010:0113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86571?format=json","purl":"pkg:mozilla/Firefox@3.0.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"},{"url":"http://public2.vulnerablecode.io/api/packages/86570?format=json","purl":"pkg:mozilla/Firefox@3.5.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0171"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-usb1-ure3-77ft"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53304?format=json","vulnerability_id":"VCID-vp62-buem-h3e3","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0176.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0176.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0176","reference_id":"","reference_type":"","scores":[{"value":"0.05361","scoring_system":"epss","scoring_elements":"0.90113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05361","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05361","scoring_system":"epss","scoring_elements":"0.90154","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05361","scoring_system":"epss","scoring_elements":"0.90145","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05361","scoring_system":"epss","scoring_elements":"0.90151","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05361","scoring_system":"epss","scoring_elements":"0.90139","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05361","scoring_system":"epss","scoring_elements":"0.90124","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90185","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90173","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90181","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90196","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0543","scoring_system":"epss","scoring_elements":"0.90195","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0831","scoring_system":"epss","scoring_elements":"0.92248","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0831","scoring_system":"epss","scoring_elements":"0.92277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0831","scoring_system":"epss","scoring_elements":"0.92271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0831","scoring_system":"epss","scoring_elements":"0.92267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0831","scoring_system":"epss","scoring_elements":"0.92256","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0831","scoring_system":"epss","scoring_elements":"0.9224","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0831","scoring_system":"epss","scoring_elements":"0.92253","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0176"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=578150","reference_id":"578150","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=578150"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176","reference_id":"CVE-2010-0176","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-18","reference_id":"mfsa2010-18","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0332","reference_id":"RHSA-2010:0332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0333","reference_id":"RHSA-2010:0333","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0333"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0544","reference_id":"RHSA-2010:0544","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0544"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0545","reference_id":"RHSA-2010:0545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0545"},{"reference_url":"https://usn.ubuntu.com/920-1/","reference_id":"USN-920-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/920-1/"},{"reference_url":"https://usn.ubuntu.com/921-1/","reference_id":"USN-921-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/921-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86558?format=json","purl":"pkg:mozilla/Firefox@3.0.19","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.19"},{"url":"http://public2.vulnerablecode.io/api/packages/86557?format=json","purl":"pkg:mozilla/Firefox@3.5.9","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.9"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0176"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vp62-buem-h3e3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53117?format=json","vulnerability_id":"VCID-xav9-5vp3-q3g2","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0165","reference_id":"","reference_type":"","scores":[{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87736","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87556","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87566","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.876","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87606","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87613","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.8761","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87623","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87641","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87646","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.8766","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87676","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87694","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.8769","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03502","scoring_system":"epss","scoring_elements":"0.87704","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0165"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165","reference_id":"CVE-2010-0165","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-11","reference_id":"mfsa2010-11","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-11"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86571?format=json","purl":"pkg:mozilla/Firefox@3.0.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"},{"url":"http://public2.vulnerablecode.io/api/packages/86570?format=json","purl":"pkg:mozilla/Firefox@3.5.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0165"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xav9-5vp3-q3g2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53181?format=json","vulnerability_id":"VCID-y1cq-jzte-p3hq","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0169","reference_id":"","reference_type":"","scores":[{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62323","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62067","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62127","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62159","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62177","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62195","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62212","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62202","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62182","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62225","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62216","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62227","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62243","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62237","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62231","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62289","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62242","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00424","scoring_system":"epss","scoring_elements":"0.62269","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0169"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=576694","reference_id":"576694","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=576694"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169","reference_id":"CVE-2010-0169","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-14","reference_id":"mfsa2010-14","reference_type":"","scores":[{"value":"low","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-14"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0112","reference_id":"RHSA-2010:0112","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0112"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0113","reference_id":"RHSA-2010:0113","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0113"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0153","reference_id":"RHSA-2010:0153","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0153"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0154","reference_id":"RHSA-2010:0154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0154"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86571?format=json","purl":"pkg:mozilla/Firefox@3.0.18","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.0.18"},{"url":"http://public2.vulnerablecode.io/api/packages/86570?format=json","purl":"pkg:mozilla/Firefox@3.5.8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.5.8"},{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-0169"],"risk_score":1.4,"exploitability":"0.5","weighted_severity":"2.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y1cq-jzte-p3hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/53354?format=json","vulnerability_id":"VCID-z6j2-32tf-g7ax","summary":"Multiple vulnerabilities have been found in Mozilla Firefox,\n    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may\n    allow execution of arbitrary code or local privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1028.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1028","reference_id":"","reference_type":"","scores":[{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93088","published_at":"2026-05-14T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.92976","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.92984","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.92988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.92987","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.92996","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93005","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93014","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93017","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93024","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93029","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93045","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93056","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93059","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09896","scoring_system":"epss","scoring_elements":"0.93066","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-1028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=566596","reference_id":"566596","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=566596"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787085","reference_id":"787085","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028","reference_id":"CVE-2010-1028","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028"},{"reference_url":"https://security.gentoo.org/glsa/201301-01","reference_id":"GLSA-201301-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201301-01"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-08","reference_id":"mfsa2010-08","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2010-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/86556?format=json","purl":"pkg:mozilla/Firefox@3.6.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}],"aliases":["CVE-2010-1028"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z6j2-32tf-g7ax"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox@3.6.2"}