Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/seamonkey@1.0.9-32?arch=el4
Typerpm
Namespaceredhat
Nameseamonkey
Version1.0.9-32
Qualifiers
arch el4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-26jm-mpad-9ugz
vulnerability_id VCID-26jm-mpad-9ugz
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5504.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5504.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5504
reference_id
reference_type
scores
0
value 0.03153
scoring_system epss
scoring_elements 0.86922
published_at 2026-04-21T12:55:00Z
1
value 0.03153
scoring_system epss
scoring_elements 0.86846
published_at 2026-04-01T12:55:00Z
2
value 0.03153
scoring_system epss
scoring_elements 0.869
published_at 2026-04-13T12:55:00Z
3
value 0.03153
scoring_system epss
scoring_elements 0.86916
published_at 2026-04-16T12:55:00Z
4
value 0.03153
scoring_system epss
scoring_elements 0.86856
published_at 2026-04-02T12:55:00Z
5
value 0.03153
scoring_system epss
scoring_elements 0.86875
published_at 2026-04-04T12:55:00Z
6
value 0.03153
scoring_system epss
scoring_elements 0.86869
published_at 2026-04-07T12:55:00Z
7
value 0.03153
scoring_system epss
scoring_elements 0.86889
published_at 2026-04-08T12:55:00Z
8
value 0.03153
scoring_system epss
scoring_elements 0.86897
published_at 2026-04-09T12:55:00Z
9
value 0.03153
scoring_system epss
scoring_elements 0.8691
published_at 2026-04-11T12:55:00Z
10
value 0.03153
scoring_system epss
scoring_elements 0.86905
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5504
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=453526
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=453526
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
6
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
7
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
8
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47410
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47410
9
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10781
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10781
10
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
11
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
13
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-62.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-62.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
15
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
16
reference_url http://www.securitytracker.com/id?1021422
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021422
17
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
18
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476273
reference_id 476273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476273
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5504
reference_id CVE-2008-5504
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5504
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5504
reference_id CVE-2008-5504
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5504
41
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
42
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-62
reference_id mfsa2008-62
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-62
43
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
44
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
fixed_packages
aliases CVE-2008-5504
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-26jm-mpad-9ugz
1
url VCID-eh6u-wqar-ubb7
vulnerability_id VCID-eh6u-wqar-ubb7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5506.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5506
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-21T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66813
published_at 2026-04-01T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66884
published_at 2026-04-13T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66932
published_at 2026-04-18T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66851
published_at 2026-04-02T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66877
published_at 2026-04-04T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.6685
published_at 2026-04-07T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66898
published_at 2026-04-08T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66911
published_at 2026-04-09T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66931
published_at 2026-04-11T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66917
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5506
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=458248
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=458248
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
5
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
6
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
7
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
8
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
9
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
10
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
11
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
12
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
13
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
14
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
15
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
16
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
17
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
18
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
19
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
20
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47412
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47412
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10512
23
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
25
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
26
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
27
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
28
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
32
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-64.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
36
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
37
reference_url http://www.securitytracker.com/id?1021427
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021427
38
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
39
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
40
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
41
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476278
reference_id 476278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476278
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
reference_id CVE-2008-5506
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5506
reference_id CVE-2008-5506
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5506
54
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-64
reference_id mfsa2008-64
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-64
56
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
57
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
58
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
59
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
60
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
61
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
62
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
63
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5506
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eh6u-wqar-ubb7
2
url VCID-f5tf-hr4a-tqad
vulnerability_id VCID-f5tf-hr4a-tqad
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5512
reference_id
reference_type
scores
0
value 0.04686
scoring_system epss
scoring_elements 0.89356
published_at 2026-04-21T12:55:00Z
1
value 0.04686
scoring_system epss
scoring_elements 0.89302
published_at 2026-04-01T12:55:00Z
2
value 0.04686
scoring_system epss
scoring_elements 0.8936
published_at 2026-04-16T12:55:00Z
3
value 0.04686
scoring_system epss
scoring_elements 0.89359
published_at 2026-04-18T12:55:00Z
4
value 0.04686
scoring_system epss
scoring_elements 0.89307
published_at 2026-04-02T12:55:00Z
5
value 0.04686
scoring_system epss
scoring_elements 0.8932
published_at 2026-04-04T12:55:00Z
6
value 0.04686
scoring_system epss
scoring_elements 0.89323
published_at 2026-04-07T12:55:00Z
7
value 0.04686
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-08T12:55:00Z
8
value 0.04686
scoring_system epss
scoring_elements 0.89344
published_at 2026-04-09T12:55:00Z
9
value 0.04686
scoring_system epss
scoring_elements 0.89352
published_at 2026-04-11T12:55:00Z
10
value 0.04686
scoring_system epss
scoring_elements 0.89349
published_at 2026-04-12T12:55:00Z
11
value 0.04686
scoring_system epss
scoring_elements 0.89345
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5512
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47416
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47416
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9814
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021418
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021418
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476287
reference_id 476287
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476287
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512
reference_id CVE-2008-5512
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5512
reference_id CVE-2008-5512
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5512
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
reference_id mfsa2008-68
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5512
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5tf-hr4a-tqad
3
url VCID-g351-11xn-quhs
vulnerability_id VCID-g351-11xn-quhs
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5501
reference_id
reference_type
scores
0
value 0.04539
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-21T12:55:00Z
1
value 0.04539
scoring_system epss
scoring_elements 0.89126
published_at 2026-04-01T12:55:00Z
2
value 0.04539
scoring_system epss
scoring_elements 0.89178
published_at 2026-04-13T12:55:00Z
3
value 0.04539
scoring_system epss
scoring_elements 0.89191
published_at 2026-04-18T12:55:00Z
4
value 0.04539
scoring_system epss
scoring_elements 0.89134
published_at 2026-04-02T12:55:00Z
5
value 0.04539
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-04T12:55:00Z
6
value 0.04539
scoring_system epss
scoring_elements 0.89151
published_at 2026-04-07T12:55:00Z
7
value 0.04539
scoring_system epss
scoring_elements 0.89169
published_at 2026-04-08T12:55:00Z
8
value 0.04539
scoring_system epss
scoring_elements 0.89174
published_at 2026-04-09T12:55:00Z
9
value 0.04539
scoring_system epss
scoring_elements 0.89184
published_at 2026-04-11T12:55:00Z
10
value 0.04539
scoring_system epss
scoring_elements 0.89181
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5501
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=395623
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=395623
3
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
7
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
8
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47407
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47407
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10257
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
13
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
17
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
18
reference_url http://www.securitytracker.com/id?1021417
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021417
19
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476267
reference_id 476267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476267
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501
reference_id CVE-2008-5501
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5501
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5501
reference_id CVE-2008-5501
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5501
27
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
reference_id mfsa2008-60
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
29
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
30
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
31
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
32
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
fixed_packages
aliases CVE-2008-5501
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g351-11xn-quhs
4
url VCID-hmsz-pbfg-ube6
vulnerability_id VCID-hmsz-pbfg-ube6
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5513.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5513
reference_id
reference_type
scores
0
value 0.01096
scoring_system epss
scoring_elements 0.78024
published_at 2026-04-21T12:55:00Z
1
value 0.01096
scoring_system epss
scoring_elements 0.77942
published_at 2026-04-01T12:55:00Z
2
value 0.01096
scoring_system epss
scoring_elements 0.78032
published_at 2026-04-16T12:55:00Z
3
value 0.01096
scoring_system epss
scoring_elements 0.78031
published_at 2026-04-18T12:55:00Z
4
value 0.01096
scoring_system epss
scoring_elements 0.77949
published_at 2026-04-02T12:55:00Z
5
value 0.01096
scoring_system epss
scoring_elements 0.77976
published_at 2026-04-04T12:55:00Z
6
value 0.01096
scoring_system epss
scoring_elements 0.77958
published_at 2026-04-07T12:55:00Z
7
value 0.01096
scoring_system epss
scoring_elements 0.77984
published_at 2026-04-08T12:55:00Z
8
value 0.01096
scoring_system epss
scoring_elements 0.77989
published_at 2026-04-09T12:55:00Z
9
value 0.01096
scoring_system epss
scoring_elements 0.78015
published_at 2026-04-11T12:55:00Z
10
value 0.01096
scoring_system epss
scoring_elements 0.77999
published_at 2026-04-12T12:55:00Z
11
value 0.01096
scoring_system epss
scoring_elements 0.77997
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5513
2
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
3
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
7
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
8
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
9
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
10
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47418
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47418
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10389
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
14
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
17
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-69.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-69.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
19
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
20
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
21
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
22
reference_url http://www.securitytracker.com/id?1021421
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021421
23
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
24
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476289
reference_id 476289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476289
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513
reference_id CVE-2008-5513
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5513
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5513
reference_id CVE-2008-5513
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5513
36
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
37
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-69
reference_id mfsa2008-69
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-69
38
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
39
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
40
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
41
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
42
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
fixed_packages
aliases CVE-2008-5513
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hmsz-pbfg-ube6
5
url VCID-p598-baeh-dkd7
vulnerability_id VCID-p598-baeh-dkd7
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5500.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5500
reference_id
reference_type
scores
0
value 0.06165
scoring_system epss
scoring_elements 0.9085
published_at 2026-04-21T12:55:00Z
1
value 0.06165
scoring_system epss
scoring_elements 0.90781
published_at 2026-04-01T12:55:00Z
2
value 0.06165
scoring_system epss
scoring_elements 0.90854
published_at 2026-04-16T12:55:00Z
3
value 0.06165
scoring_system epss
scoring_elements 0.90852
published_at 2026-04-18T12:55:00Z
4
value 0.06165
scoring_system epss
scoring_elements 0.90787
published_at 2026-04-02T12:55:00Z
5
value 0.06165
scoring_system epss
scoring_elements 0.90799
published_at 2026-04-04T12:55:00Z
6
value 0.06165
scoring_system epss
scoring_elements 0.9081
published_at 2026-04-07T12:55:00Z
7
value 0.06165
scoring_system epss
scoring_elements 0.90821
published_at 2026-04-08T12:55:00Z
8
value 0.06165
scoring_system epss
scoring_elements 0.90828
published_at 2026-04-09T12:55:00Z
9
value 0.06165
scoring_system epss
scoring_elements 0.90836
published_at 2026-04-12T12:55:00Z
10
value 0.06165
scoring_system epss
scoring_elements 0.90834
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5500
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464998
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464998
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47406
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47406
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11053
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021417
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021417
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476266
reference_id 476266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476266
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
reference_id CVE-2008-5500
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5500
reference_id CVE-2008-5500
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5500
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
reference_id mfsa2008-60
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5500
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p598-baeh-dkd7
6
url VCID-q376-zeq4-m3ah
vulnerability_id VCID-q376-zeq4-m3ah
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5507
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44068
published_at 2026-04-21T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44059
published_at 2026-04-01T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44142
published_at 2026-04-16T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44133
published_at 2026-04-18T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44107
published_at 2026-04-02T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.4413
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44061
published_at 2026-04-07T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.44112
published_at 2026-04-08T12:55:00Z
8
value 0.00216
scoring_system epss
scoring_elements 0.44114
published_at 2026-04-09T12:55:00Z
9
value 0.00216
scoring_system epss
scoring_elements 0.44097
published_at 2026-04-12T12:55:00Z
10
value 0.00216
scoring_system epss
scoring_elements 0.44081
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5507
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=461735
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=461735
3
reference_url http://scary.beasts.org/security/CESA-2008-011.html
reference_id
reference_type
scores
url http://scary.beasts.org/security/CESA-2008-011.html
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47413
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47413
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9376
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-65.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/archive/1/499353/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/499353/100/0/threaded
38
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
39
reference_url http://www.securitytracker.com/id?1021423
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021423
40
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
41
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
42
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
43
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
44
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476280
reference_id 476280
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476280
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
reference_id CVE-2008-5507
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507
55
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5507
reference_id CVE-2008-5507
reference_type
scores
0
value 6.0
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5507
56
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-65
reference_id mfsa2008-65
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-65
58
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
59
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
60
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
61
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
62
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
63
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
64
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
65
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5507
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q376-zeq4-m3ah
7
url VCID-r79k-3rkt-6fa8
vulnerability_id VCID-r79k-3rkt-6fa8
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5511
reference_id
reference_type
scores
0
value 0.01017
scoring_system epss
scoring_elements 0.77211
published_at 2026-04-21T12:55:00Z
1
value 0.01017
scoring_system epss
scoring_elements 0.77116
published_at 2026-04-01T12:55:00Z
2
value 0.01017
scoring_system epss
scoring_elements 0.77218
published_at 2026-04-16T12:55:00Z
3
value 0.01017
scoring_system epss
scoring_elements 0.77219
published_at 2026-04-18T12:55:00Z
4
value 0.01017
scoring_system epss
scoring_elements 0.77123
published_at 2026-04-02T12:55:00Z
5
value 0.01017
scoring_system epss
scoring_elements 0.77152
published_at 2026-04-04T12:55:00Z
6
value 0.01017
scoring_system epss
scoring_elements 0.77134
published_at 2026-04-07T12:55:00Z
7
value 0.01017
scoring_system epss
scoring_elements 0.77166
published_at 2026-04-08T12:55:00Z
8
value 0.01017
scoring_system epss
scoring_elements 0.77175
published_at 2026-04-09T12:55:00Z
9
value 0.01017
scoring_system epss
scoring_elements 0.77202
published_at 2026-04-11T12:55:00Z
10
value 0.01017
scoring_system epss
scoring_elements 0.77182
published_at 2026-04-12T12:55:00Z
11
value 0.01017
scoring_system epss
scoring_elements 0.77177
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5511
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=451680
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=464174
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
13
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
14
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
15
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
16
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
17
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
18
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
19
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
20
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
21
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
22
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47417
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47417
23
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11881
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
25
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
26
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
27
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
28
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
29
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
32
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
33
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-68.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
36
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
37
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
38
reference_url http://www.securitytracker.com/id?1021418
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021418
39
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
40
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
41
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
42
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
43
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476285
reference_id 476285
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476285
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
reference_id CVE-2008-5511
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511
54
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5511
reference_id CVE-2008-5511
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5511
55
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
56
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
reference_id mfsa2008-68
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-68
57
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
58
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
59
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
60
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
61
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
62
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
63
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
64
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5511
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r79k-3rkt-6fa8
8
url VCID-rjzx-gx6e-23ff
vulnerability_id VCID-rjzx-gx6e-23ff
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5508
reference_id
reference_type
scores
0
value 0.02182
scoring_system epss
scoring_elements 0.84382
published_at 2026-04-21T12:55:00Z
1
value 0.02182
scoring_system epss
scoring_elements 0.84288
published_at 2026-04-01T12:55:00Z
2
value 0.02182
scoring_system epss
scoring_elements 0.84378
published_at 2026-04-16T12:55:00Z
3
value 0.02182
scoring_system epss
scoring_elements 0.84379
published_at 2026-04-18T12:55:00Z
4
value 0.02182
scoring_system epss
scoring_elements 0.84301
published_at 2026-04-02T12:55:00Z
5
value 0.02182
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-04T12:55:00Z
6
value 0.02182
scoring_system epss
scoring_elements 0.84323
published_at 2026-04-07T12:55:00Z
7
value 0.02182
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-08T12:55:00Z
8
value 0.02182
scoring_system epss
scoring_elements 0.8435
published_at 2026-04-09T12:55:00Z
9
value 0.02182
scoring_system epss
scoring_elements 0.84368
published_at 2026-04-11T12:55:00Z
10
value 0.02182
scoring_system epss
scoring_elements 0.8436
published_at 2026-04-12T12:55:00Z
11
value 0.02182
scoring_system epss
scoring_elements 0.84357
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5508
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=425046
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=425046
3
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=460803
4
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
5
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
6
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
7
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
8
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
9
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
10
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
11
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
12
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
13
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
14
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
15
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
16
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
17
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
18
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
19
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
20
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
21
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47414
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47414
22
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11040
23
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
24
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
25
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
26
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
27
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
28
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
29
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
30
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
31
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
32
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-66.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
35
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
36
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
37
reference_url http://www.securitytracker.com/id?1021426
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021426
38
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
39
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
40
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
41
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476281
reference_id 476281
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476281
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
reference_id CVE-2008-5508
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508
53
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5508
reference_id CVE-2008-5508
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5508
54
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
55
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-66
reference_id mfsa2008-66
reference_type
scores
0
value low
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-66
56
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
57
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
58
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
59
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
60
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
61
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
62
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5508
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rjzx-gx6e-23ff
9
url VCID-rswk-w1h3-zbc9
vulnerability_id VCID-rswk-w1h3-zbc9
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5502
reference_id
reference_type
scores
0
value 0.03767
scoring_system epss
scoring_elements 0.88056
published_at 2026-04-21T12:55:00Z
1
value 0.03767
scoring_system epss
scoring_elements 0.87987
published_at 2026-04-01T12:55:00Z
2
value 0.03767
scoring_system epss
scoring_elements 0.88044
published_at 2026-04-13T12:55:00Z
3
value 0.03767
scoring_system epss
scoring_elements 0.88057
published_at 2026-04-16T12:55:00Z
4
value 0.03767
scoring_system epss
scoring_elements 0.87996
published_at 2026-04-02T12:55:00Z
5
value 0.03767
scoring_system epss
scoring_elements 0.8801
published_at 2026-04-04T12:55:00Z
6
value 0.03767
scoring_system epss
scoring_elements 0.88015
published_at 2026-04-07T12:55:00Z
7
value 0.03767
scoring_system epss
scoring_elements 0.88035
published_at 2026-04-08T12:55:00Z
8
value 0.03767
scoring_system epss
scoring_elements 0.88041
published_at 2026-04-09T12:55:00Z
9
value 0.03767
scoring_system epss
scoring_elements 0.88051
published_at 2026-04-11T12:55:00Z
10
value 0.03767
scoring_system epss
scoring_elements 0.88043
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5502
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=458679
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=458679
3
reference_url http://secunia.com/advisories/33188
reference_id
reference_type
scores
url http://secunia.com/advisories/33188
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33203
reference_id
reference_type
scores
url http://secunia.com/advisories/33203
6
reference_url http://secunia.com/advisories/33216
reference_id
reference_type
scores
url http://secunia.com/advisories/33216
7
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
8
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
9
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47408
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47408
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10001
11
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
12
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:245
13
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-60.html
14
reference_url http://www.redhat.com/support/errata/RHSA-2008-1036.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1036.html
15
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
17
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
18
reference_url http://www.securitytracker.com/id?1021417
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021417
19
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476269
reference_id 476269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476269
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502
reference_id CVE-2008-5502
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5502
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5502
reference_id CVE-2008-5502
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-5502
27
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
28
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
reference_id mfsa2008-60
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-60
29
reference_url https://access.redhat.com/errata/RHSA-2008:1036
reference_id RHSA-2008:1036
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1036
30
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
31
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
32
reference_url https://usn.ubuntu.com/690-1/
reference_id USN-690-1
reference_type
scores
url https://usn.ubuntu.com/690-1/
fixed_packages
aliases CVE-2008-5502
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rswk-w1h3-zbc9
10
url VCID-wjmb-tuta-2qc4
vulnerability_id VCID-wjmb-tuta-2qc4
summary
Multiple vulnerabilities have been found in Mozilla Firefox,
    Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner, some of which may
    allow execution of arbitrary code or local privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5503.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5503
reference_id
reference_type
scores
0
value 0.01234
scoring_system epss
scoring_elements 0.79213
published_at 2026-04-21T12:55:00Z
1
value 0.01234
scoring_system epss
scoring_elements 0.79139
published_at 2026-04-01T12:55:00Z
2
value 0.01234
scoring_system epss
scoring_elements 0.79191
published_at 2026-04-13T12:55:00Z
3
value 0.01234
scoring_system epss
scoring_elements 0.79216
published_at 2026-04-16T12:55:00Z
4
value 0.01234
scoring_system epss
scoring_elements 0.79146
published_at 2026-04-02T12:55:00Z
5
value 0.01234
scoring_system epss
scoring_elements 0.79171
published_at 2026-04-04T12:55:00Z
6
value 0.01234
scoring_system epss
scoring_elements 0.79156
published_at 2026-04-07T12:55:00Z
7
value 0.01234
scoring_system epss
scoring_elements 0.79182
published_at 2026-04-08T12:55:00Z
8
value 0.01234
scoring_system epss
scoring_elements 0.7919
published_at 2026-04-09T12:55:00Z
9
value 0.01234
scoring_system epss
scoring_elements 0.79214
published_at 2026-04-11T12:55:00Z
10
value 0.01234
scoring_system epss
scoring_elements 0.79199
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5503
2
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=379959
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=379959
3
reference_url http://secunia.com/advisories/33184
reference_id
reference_type
scores
url http://secunia.com/advisories/33184
4
reference_url http://secunia.com/advisories/33189
reference_id
reference_type
scores
url http://secunia.com/advisories/33189
5
reference_url http://secunia.com/advisories/33204
reference_id
reference_type
scores
url http://secunia.com/advisories/33204
6
reference_url http://secunia.com/advisories/33205
reference_id
reference_type
scores
url http://secunia.com/advisories/33205
7
reference_url http://secunia.com/advisories/33231
reference_id
reference_type
scores
url http://secunia.com/advisories/33231
8
reference_url http://secunia.com/advisories/33232
reference_id
reference_type
scores
url http://secunia.com/advisories/33232
9
reference_url http://secunia.com/advisories/33408
reference_id
reference_type
scores
url http://secunia.com/advisories/33408
10
reference_url http://secunia.com/advisories/33415
reference_id
reference_type
scores
url http://secunia.com/advisories/33415
11
reference_url http://secunia.com/advisories/33421
reference_id
reference_type
scores
url http://secunia.com/advisories/33421
12
reference_url http://secunia.com/advisories/33433
reference_id
reference_type
scores
url http://secunia.com/advisories/33433
13
reference_url http://secunia.com/advisories/33434
reference_id
reference_type
scores
url http://secunia.com/advisories/33434
14
reference_url http://secunia.com/advisories/33523
reference_id
reference_type
scores
url http://secunia.com/advisories/33523
15
reference_url http://secunia.com/advisories/33547
reference_id
reference_type
scores
url http://secunia.com/advisories/33547
16
reference_url http://secunia.com/advisories/34501
reference_id
reference_type
scores
url http://secunia.com/advisories/34501
17
reference_url http://secunia.com/advisories/35080
reference_id
reference_type
scores
url http://secunia.com/advisories/35080
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/47409
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/47409
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11423
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11423
20
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
21
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-258748-1
22
reference_url http://www.debian.org/security/2009/dsa-1696
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1696
23
reference_url http://www.debian.org/security/2009/dsa-1697
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1697
24
reference_url http://www.debian.org/security/2009/dsa-1704
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1704
25
reference_url http://www.debian.org/security/2009/dsa-1707
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1707
26
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2008:244
27
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:012
28
reference_url http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2008/mfsa2008-61.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2008-1037.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-1037.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2009-0002.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0002.html
31
reference_url http://www.securityfocus.com/bid/32882
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/32882
32
reference_url http://www.securitytracker.com/id?1021424
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021424
33
reference_url http://www.ubuntu.com/usn/usn-690-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-690-2
34
reference_url http://www.ubuntu.com/usn/usn-701-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-1
35
reference_url http://www.ubuntu.com/usn/usn-701-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-701-2
36
reference_url http://www.vupen.com/english/advisories/2009/0977
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0977
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=476272
reference_id 476272
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=476272
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.11:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.12:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.13:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.14:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.15:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.16:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.17:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503
reference_id CVE-2008-5503
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503
93
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5503
reference_id CVE-2008-5503
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2008-5503
94
reference_url https://security.gentoo.org/glsa/201301-01
reference_id GLSA-201301-01
reference_type
scores
url https://security.gentoo.org/glsa/201301-01
95
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2008-61
reference_id mfsa2008-61
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2008-61
96
reference_url https://access.redhat.com/errata/RHSA-2008:1037
reference_id RHSA-2008:1037
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:1037
97
reference_url https://access.redhat.com/errata/RHSA-2009:0002
reference_id RHSA-2009:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0002
98
reference_url https://usn.ubuntu.com/690-2/
reference_id USN-690-2
reference_type
scores
url https://usn.ubuntu.com/690-2/
99
reference_url https://usn.ubuntu.com/690-3/
reference_id USN-690-3
reference_type
scores
url https://usn.ubuntu.com/690-3/
100
reference_url https://usn.ubuntu.com/701-1/
reference_id USN-701-1
reference_type
scores
url https://usn.ubuntu.com/701-1/
101
reference_url https://usn.ubuntu.com/701-2/
reference_id USN-701-2
reference_type
scores
url https://usn.ubuntu.com/701-2/
fixed_packages
aliases CVE-2008-5503
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wjmb-tuta-2qc4
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/seamonkey@1.0.9-32%3Farch=el4