Lookup for vulnerable packages by Package URL.

Purlpkg:mozilla/Firefox%20ESR@10.0.9
Typemozilla
Namespace
NameFirefox ESR
Version10.0.9
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version10.0.10
Latest_non_vulnerable_version140.10.1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-ahe4-4ydd-37dz
vulnerability_id VCID-ahe4-4ydd-37dz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00010.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2012-1361.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1361.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2012-1362.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1362.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4193.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4193.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4193
reference_id
reference_type
scores
0
value 0.01406
scoring_system epss
scoring_elements 0.80549
published_at 2026-04-29T12:55:00Z
1
value 0.01406
scoring_system epss
scoring_elements 0.80418
published_at 2026-04-01T12:55:00Z
2
value 0.01406
scoring_system epss
scoring_elements 0.80529
published_at 2026-04-24T12:55:00Z
3
value 0.01406
scoring_system epss
scoring_elements 0.80532
published_at 2026-04-26T12:55:00Z
4
value 0.01406
scoring_system epss
scoring_elements 0.80424
published_at 2026-04-02T12:55:00Z
5
value 0.01406
scoring_system epss
scoring_elements 0.80445
published_at 2026-04-04T12:55:00Z
6
value 0.01406
scoring_system epss
scoring_elements 0.80435
published_at 2026-04-07T12:55:00Z
7
value 0.01406
scoring_system epss
scoring_elements 0.80464
published_at 2026-04-08T12:55:00Z
8
value 0.01406
scoring_system epss
scoring_elements 0.80474
published_at 2026-04-09T12:55:00Z
9
value 0.01406
scoring_system epss
scoring_elements 0.80493
published_at 2026-04-11T12:55:00Z
10
value 0.01406
scoring_system epss
scoring_elements 0.80478
published_at 2026-04-12T12:55:00Z
11
value 0.01406
scoring_system epss
scoring_elements 0.80471
published_at 2026-04-13T12:55:00Z
12
value 0.01406
scoring_system epss
scoring_elements 0.80499
published_at 2026-04-16T12:55:00Z
13
value 0.01406
scoring_system epss
scoring_elements 0.805
published_at 2026-04-18T12:55:00Z
14
value 0.01406
scoring_system epss
scoring_elements 0.80502
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4193
5
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=720619
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=720619
6
reference_url http://secunia.com/advisories/50904
reference_id
reference_type
scores
url http://secunia.com/advisories/50904
7
reference_url http://secunia.com/advisories/50906
reference_id
reference_type
scores
url http://secunia.com/advisories/50906
8
reference_url http://secunia.com/advisories/50907
reference_id
reference_type
scores
url http://secunia.com/advisories/50907
9
reference_url http://secunia.com/advisories/50964
reference_id
reference_type
scores
url http://secunia.com/advisories/50964
10
reference_url http://secunia.com/advisories/50984
reference_id
reference_type
scores
url http://secunia.com/advisories/50984
11
reference_url http://secunia.com/advisories/55318
reference_id
reference_type
scores
url http://secunia.com/advisories/55318
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/79211
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/79211
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16786
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16786
14
reference_url http://www.mozilla.org/security/announce/2012/mfsa2012-89.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2012/mfsa2012-89.html
15
reference_url http://www.ubuntu.com/usn/USN-1611-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1611-1
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=865215
reference_id 865215
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=865215
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird_esr:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:10:sp4:*:*:*:*:*:*
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193
reference_id CVE-2012-4193
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4193
reference_id CVE-2012-4193
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4193
40
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
41
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2012-89
reference_id mfsa2012-89
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2012-89
42
reference_url https://access.redhat.com/errata/RHSA-2012:1361
reference_id RHSA-2012:1361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1361
43
reference_url https://access.redhat.com/errata/RHSA-2012:1362
reference_id RHSA-2012:1362
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1362
44
reference_url https://usn.ubuntu.com/1611-1/
reference_id USN-1611-1
reference_type
scores
url https://usn.ubuntu.com/1611-1/
fixed_packages
0
url pkg:mozilla/Firefox%20ESR@10.0.9
purl pkg:mozilla/Firefox%20ESR@10.0.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@10.0.9
aliases CVE-2012-4193
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahe4-4ydd-37dz
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:mozilla/Firefox%2520ESR@10.0.9